File _patchinfo of Package patchinfo.37345
<patchinfo incident="37345"> <issue tracker="cve" id="2023-45229"/> <issue tracker="cve" id="2023-45230"/> <issue tracker="cve" id="2023-45231"/> <issue tracker="cve" id="2023-45232"/> <issue tracker="cve" id="2023-45233"/> <issue tracker="cve" id="2023-45234"/> <issue tracker="cve" id="2023-45235"/> <issue tracker="cve" id="2023-45236"/> <issue tracker="cve" id="2023-45237"/> <issue tracker="bnc" id="1218879">VUL-0: CVE-2023-45229: edk2, ovmf: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message</issue> <issue tracker="bnc" id="1218880">VUL-0: CVE-2023-45230: edk2, ovmf: Buffer overflow in the DHCPv6 client via a long Server ID option</issue> <issue tracker="bnc" id="1218881">VUL-0: CVE-2023-45231: edk2, ovmf: Out of Bounds read when handling a ND Redirect message with truncated options</issue> <issue tracker="bnc" id="1218882">VUL-0: CVE-2023-45232: edk2, ovmf: Infinite loop when parsing unknown options in the Destination Options header</issue> <issue tracker="bnc" id="1218883">VUL-0: CVE-2023-45233: edk2, ovmf: Infinite loop when parsing a PadN option in the Destination Options header</issue> <issue tracker="bnc" id="1218884">VUL-0: CVE-2023-45234: edk2, ovmf: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</issue> <issue tracker="bnc" id="1218885">VUL-0: CVE-2023-45235: edk2, ovmf: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message</issue> <issue tracker="bnc" id="1218886">VUL-0: CVE-2023-45236: edk2, ovmf: Predictable TCP Initial Sequence Numbers</issue> <issue tracker="bnc" id="1218887">VUL-0: CVE-2023-45237: edk2, ovmf: Use of a Weak PseudoRandom Number Generator</issue> <packager>joeyli</packager> <rating>important</rating> <category>security</category> <summary>Security update for ovmf</summary> <description>This update for ovmf fixes the following issues: - CVE-2023-45229: out-of-bounds read in edk2 when processing IA_NA/IA_TA options in DHCPv6 Advertise messages. (bsc#1218879) - CVE-2023-45230: buffer overflow in the DHCPv6 client in edk2 via a long Server ID option. (bsc#1218880) - CVE-2023-45231: out-of-bounds read in edk2 when handling a ND Redirect message with truncated options. (bsc#1218881) - CVE-2023-45232: infinite loop in edk2 when parsing unknown options in the Destination Options header. (bsc#1218882) - CVE-2023-45233: infinite loop in edk2 when parsing PadN options in the Destination Options header. (bsc#1218883) - CVE-2023-45234: buffer overflow in edk2 when processing DNS Servers options in a DHCPv6 Advertise message. (bsc#1218884) - CVE-2023-45235: buffer overflow in edk2 when handling the Server ID option in a DHCPv6 proxy Advertise message. (bsc#1218885) - CVE-2023-45236: predictable TCP Initial Sequence Numbers in edk2 network packages. (bsc#1218886) - CVE-2023-45237: use of a weak pseudorandom number generator in edk2. (bsc#1218887) </description> </patchinfo>