Security update for ovmf
| Announcement ID: | SUSE-SU-2026:0196-1 |
|---|---|
| Release Date: | 2026-01-21T09:05:27Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for ovmf fixes the following issues:
- CVE-2023-45231: Fixed out of bounds read when handling a ND Redirect message with truncated options (bsc#1218881).
- CVE-2023-45232: Fixed infinite loop when parsing unknown options in the Destination Options header (bsc#1218882).
- CVE-2023-45233: Fixed infinite loop when parsing a PadN option in the Destination Options header (bsc#1218883).
- CVE-2023-45234: Fixed buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (bsc#1218884).
- CVE-2023-45235: Fixed buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (bsc#1218885).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-196=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-196=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 x86_64)
- ovmf-2017+git1510945757.b2662641d5-3.55.1
- ovmf-tools-2017+git1510945757.b2662641d5-3.55.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1
- qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- ovmf-2017+git1510945757.b2662641d5-3.55.1
- ovmf-tools-2017+git1510945757.b2662641d5-3.55.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1
References:
- https://www.suse.com/security/cve/CVE-2023-45231.html
- https://www.suse.com/security/cve/CVE-2023-45232.html
- https://www.suse.com/security/cve/CVE-2023-45233.html
- https://www.suse.com/security/cve/CVE-2023-45234.html
- https://www.suse.com/security/cve/CVE-2023-45235.html
- https://bugzilla.suse.com/show_bug.cgi?id=1218881
- https://bugzilla.suse.com/show_bug.cgi?id=1218882
- https://bugzilla.suse.com/show_bug.cgi?id=1218883
- https://bugzilla.suse.com/show_bug.cgi?id=1218884
- https://bugzilla.suse.com/show_bug.cgi?id=1218885