<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ovmf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0752-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-28T16:27:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-28T16:27:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-28T16:27:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ovmf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ovmf fixes the following issues:

- CVE-2023-45229: out-of-bounds read in edk2 when processing IA_NA/IA_TA options in DHCPv6 Advertise messages.
  (bsc#1218879)
- CVE-2023-45230: buffer overflow in the DHCPv6 client in edk2 via a long Server ID option. (bsc#1218880)
- CVE-2023-45231: out-of-bounds read in edk2 when handling a ND Redirect message with truncated options. (bsc#1218881)
- CVE-2023-45232: infinite loop in edk2 when parsing unknown options in the Destination Options header. (bsc#1218882)
- CVE-2023-45233: infinite loop in edk2 when parsing PadN options in the Destination Options header. (bsc#1218883)
- CVE-2023-45234: buffer overflow in edk2 when processing DNS Servers options in a DHCPv6 Advertise message.
  (bsc#1218884)
- CVE-2023-45235: buffer overflow in edk2 when handling the Server ID option in a DHCPv6 proxy Advertise message.
  (bsc#1218885)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-752,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-752,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-752,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-752,SUSE-SUSE-MicroOS-5.1-2025-752,SUSE-SUSE-MicroOS-5.2-2025-752,SUSE-Storage-7.1-2025-752</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      <Description>Link for SUSE-SU-2025:0752-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0752-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218879</URL>
      <Description>SUSE Bug 1218879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218880</URL>
      <Description>SUSE Bug 1218880</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218881</URL>
      <Description>SUSE Bug 1218881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218882</URL>
      <Description>SUSE Bug 1218882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218883</URL>
      <Description>SUSE Bug 1218883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218884</URL>
      <Description>SUSE Bug 1218884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218885</URL>
      <Description>SUSE Bug 1218885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45229/</URL>
      <Description>SUSE CVE CVE-2023-45229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45230/</URL>
      <Description>SUSE CVE CVE-2023-45230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45231/</URL>
      <Description>SUSE CVE CVE-2023-45231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45232/</URL>
      <Description>SUSE CVE CVE-2023-45232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45233/</URL>
      <Description>SUSE CVE CVE-2023-45233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45234/</URL>
      <Description>SUSE CVE CVE-2023-45234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45235/</URL>
      <Description>SUSE CVE CVE-2023-45235 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.1">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1" CPE="cpe:/o:suse:suse-microos:5.1">SUSE Linux Enterprise Micro 5.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-202008-150300.10.26.1">
      <FullProductName ProductID="ovmf-202008-150300.10.26.1">ovmf-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-tools-202008-150300.10.26.1">
      <FullProductName ProductID="ovmf-tools-202008-150300.10.26.1">ovmf-tools-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-ia32-202008-150300.10.26.1">
      <FullProductName ProductID="qemu-ovmf-ia32-202008-150300.10.26.1">qemu-ovmf-ia32-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-202008-150300.10.26.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-debug-202008-150300.10.26.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-debug-202008-150300.10.26.1">qemu-ovmf-x86_64-debug-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch32-202008-150300.10.26.1">
      <FullProductName ProductID="qemu-uefi-aarch32-202008-150300.10.26.1">qemu-uefi-aarch32-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch64-202008-150300.10.26.1">
      <FullProductName ProductID="qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ovmf-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1">ovmf-202008-150300.10.26.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1">ovmf-tools-202008-150300.10.26.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1">ovmf-202008-150300.10.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1">ovmf-tools-202008-150300.10.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1">ovmf-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1">ovmf-tools-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1">qemu-uefi-aarch64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1">ovmf-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1">ovmf-tools-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202008-150300.10.26.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1">qemu-ovmf-x86_64-202008-150300.10.26.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.</Note>
    </Notes>
    <CVE>CVE-2023-45229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45229.html</URL>
        <Description>CVE-2023-45229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218879</URL>
        <Description>SUSE Bug 1218879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45230.html</URL>
        <Description>CVE-2023-45230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218880</URL>
        <Description>SUSE Bug 1218880</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing   Neighbor Discovery Redirect message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.</Note>
    </Notes>
    <CVE>CVE-2023-45231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45231.html</URL>
        <Description>CVE-2023-45231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218881</URL>
        <Description>SUSE Bug 1218881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45232.html</URL>
        <Description>CVE-2023-45232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218882</URL>
        <Description>SUSE Bug 1218882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45233.html</URL>
        <Description>CVE-2023-45233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218883</URL>
        <Description>SUSE Bug 1218883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45234.html</URL>
        <Description>CVE-2023-45234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218884</URL>
        <Description>SUSE Bug 1218884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"> EDK2's Network Package is susceptible to a buffer overflow vulnerability when





handling Server ID option 



 from a DHCPv6 proxy Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

</Note>
    </Notes>
    <CVE>CVE-2023-45235</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.1:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:qemu-uefi-aarch64-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:ovmf-tools-202008-150300.10.26.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:qemu-ovmf-x86_64-202008-150300.10.26.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250752-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45235.html</URL>
        <Description>CVE-2023-45235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218885</URL>
        <Description>SUSE Bug 1218885</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
