<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ovmf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0421-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-11T10:28:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-11T10:28:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-11T10:28:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ovmf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ovmf fixes the following issues:
  
- CVE-2023-45229: out-of-bounds read in edk2 when processing IA_NA/IA_TA options in DHCPv6 Advertise messages.
  (bsc#1218879)
- CVE-2023-45230: buffer overflow in the DHCPv6 client in edk2 via a long Server ID option. (bsc#1218880)
- CVE-2023-45231: out-of-bounds read in edk2 when handling a ND Redirect message with truncated options. (bsc#1218881)
- CVE-2023-45232: infinite loop in edk2 when parsing unknown options in the Destination Options header. (bsc#1218882)
- CVE-2023-45233: infinite loop in edk2 when parsing PadN options in the Destination Options header. (bsc#1218883)
- CVE-2023-45234: buffer overflow in edk2 when processing DNS Servers options in a DHCPv6 Advertise message.
  (bsc#1218884)
- CVE-2023-45235: buffer overflow in edk2 when handling the Server ID option in a DHCPv6 proxy Advertise message.
  (bsc#1218885)
- CVE-2023-45236: predictable TCP Initial Sequence Numbers in edk2 network packages. (bsc#1218886)
- CVE-2023-45237: use of a weak pseudorandom number generator in edk2. (bsc#1218887)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-421,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-421,SUSE-SLE-Module-Server-Applications-15-SP6-2025-421,openSUSE-SLE-15.6-2025-421</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      <Description>Link for SUSE-SU-2025:0421-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0421-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218879</URL>
      <Description>SUSE Bug 1218879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218880</URL>
      <Description>SUSE Bug 1218880</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218881</URL>
      <Description>SUSE Bug 1218881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218882</URL>
      <Description>SUSE Bug 1218882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218883</URL>
      <Description>SUSE Bug 1218883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218884</URL>
      <Description>SUSE Bug 1218884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218885</URL>
      <Description>SUSE Bug 1218885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218886</URL>
      <Description>SUSE Bug 1218886</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218887</URL>
      <Description>SUSE Bug 1218887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45229/</URL>
      <Description>SUSE CVE CVE-2023-45229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45230/</URL>
      <Description>SUSE CVE CVE-2023-45230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45231/</URL>
      <Description>SUSE CVE CVE-2023-45231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45232/</URL>
      <Description>SUSE CVE CVE-2023-45232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45233/</URL>
      <Description>SUSE CVE CVE-2023-45233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45234/</URL>
      <Description>SUSE CVE CVE-2023-45234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45235/</URL>
      <Description>SUSE CVE CVE-2023-45235 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45236/</URL>
      <Description>SUSE CVE CVE-2023-45236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45237/</URL>
      <Description>SUSE CVE CVE-2023-45237 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6" CPE="cpe:/o:suse:packagehub:15:sp6">SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6" CPE="cpe:/o:suse:sle-module-server-applications:15:sp6">SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-202308-150600.5.9.1">
      <FullProductName ProductID="ovmf-202308-150600.5.9.1">ovmf-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-tools-202308-150600.5.9.1">
      <FullProductName ProductID="ovmf-tools-202308-150600.5.9.1">ovmf-tools-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-ia32-202308-150600.5.9.1">
      <FullProductName ProductID="qemu-ovmf-ia32-202308-150600.5.9.1">qemu-ovmf-ia32-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-202308-150600.5.9.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-202308-150600.5.9.1">qemu-ovmf-x86_64-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-debug-202308-150600.5.9.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-debug-202308-150600.5.9.1">qemu-ovmf-x86_64-debug-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch32-202308-150600.5.9.1">
      <FullProductName ProductID="qemu-uefi-aarch32-202308-150600.5.9.1">qemu-uefi-aarch32-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch64-202308-150600.5.9.1">
      <FullProductName ProductID="qemu-uefi-aarch64-202308-150600.5.9.1">qemu-uefi-aarch64-202308-150600.5.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="qemu-ovmf-x86_64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1">qemu-ovmf-x86_64-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-debug-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1">qemu-ovmf-x86_64-debug-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch32-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1">qemu-uefi-aarch32-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1">qemu-uefi-aarch64-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1">ovmf-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1">ovmf-tools-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1">qemu-ovmf-x86_64-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1">qemu-uefi-aarch64-202308-150600.5.9.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ovmf-202308-150600.5.9.1">ovmf-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1">ovmf-tools-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-ia32-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1">qemu-ovmf-ia32-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1">qemu-ovmf-x86_64-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-debug-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1">qemu-ovmf-x86_64-debug-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch32-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1">qemu-uefi-aarch32-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202308-150600.5.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1">qemu-uefi-aarch64-202308-150600.5.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.</Note>
    </Notes>
    <CVE>CVE-2023-45229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45229.html</URL>
        <Description>CVE-2023-45229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218879</URL>
        <Description>SUSE Bug 1218879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45230.html</URL>
        <Description>CVE-2023-45230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218880</URL>
        <Description>SUSE Bug 1218880</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing   Neighbor Discovery Redirect message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.</Note>
    </Notes>
    <CVE>CVE-2023-45231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45231.html</URL>
        <Description>CVE-2023-45231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218881</URL>
        <Description>SUSE Bug 1218881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45232.html</URL>
        <Description>CVE-2023-45232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218882</URL>
        <Description>SUSE Bug 1218882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45233.html</URL>
        <Description>CVE-2023-45233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218883</URL>
        <Description>SUSE Bug 1218883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45234.html</URL>
        <Description>CVE-2023-45234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218884</URL>
        <Description>SUSE Bug 1218884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability when





handling Server ID option 



 from a DHCPv6 proxy Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45235</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45235.html</URL>
        <Description>CVE-2023-45235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218885</URL>
        <Description>SUSE Bug 1218885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> 
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.



</Note>
    </Notes>
    <CVE>CVE-2023-45236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45236.html</URL>
        <Description>CVE-2023-45236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218886</URL>
        <Description>SUSE Bug 1218886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> 
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.



</Note>
    </Notes>
    <CVE>CVE-2023-45237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15 SP6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:ovmf-tools-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-ia32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-ovmf-x86_64-debug-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch32-202308-150600.5.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:qemu-uefi-aarch64-202308-150600.5.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250421-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45237.html</URL>
        <Description>CVE-2023-45237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218887</URL>
        <Description>SUSE Bug 1218887</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
