<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ovmf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0196-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-21T09:05:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-21T09:05:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-21T09:05:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ovmf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ovmf fixes the following issues:

- CVE-2023-45231: Fixed out of bounds read when handling a ND Redirect message with truncated options (bsc#1218881).
- CVE-2023-45232: Fixed infinite loop when parsing unknown options in the Destination Options header (bsc#1218882).
- CVE-2023-45233: Fixed infinite loop when parsing a PadN option in the Destination Options header (bsc#1218883).
- CVE-2023-45234: Fixed buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (bsc#1218884).
- CVE-2023-45235: Fixed buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (bsc#1218885).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2026-196,SUSE-SLE-SERVER-12-SP5-LTSS-2026-196,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-196</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      <Description>Link for SUSE-SU-2026:0196-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0196-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218881</URL>
      <Description>SUSE Bug 1218881</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218882</URL>
      <Description>SUSE Bug 1218882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218883</URL>
      <Description>SUSE Bug 1218883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218884</URL>
      <Description>SUSE Bug 1218884</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218885</URL>
      <Description>SUSE Bug 1218885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45231/</URL>
      <Description>SUSE CVE CVE-2023-45231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45232/</URL>
      <Description>SUSE CVE CVE-2023-45232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45233/</URL>
      <Description>SUSE CVE CVE-2023-45233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45234/</URL>
      <Description>SUSE CVE CVE-2023-45234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45235/</URL>
      <Description>SUSE CVE CVE-2023-45235 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="ovmf-2017+git1510945757.b2662641d5-3.55.1">ovmf-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-tools-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="ovmf-tools-2017+git1510945757.b2662641d5-3.55.1">ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="qemu-ovmf-ia32-2017+git1510945757.b2662641d5-3.55.1">qemu-ovmf-ia32-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1">qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-3.55.1">qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1">
      <FullProductName ProductID="qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1">qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ovmf-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1">ovmf-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1">ovmf-tools-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1">qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1">qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1">ovmf-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1">ovmf-tools-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1">qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing   Neighbor Discovery Redirect message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.</Note>
    </Notes>
    <CVE>CVE-2023-45231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45231.html</URL>
        <Description>CVE-2023-45231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218881</URL>
        <Description>SUSE Bug 1218881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.</Note>
    </Notes>
    <CVE>CVE-2023-45232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45232.html</URL>
        <Description>CVE-2023-45232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218882</URL>
        <Description>SUSE Bug 1218882</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.</Note>
    </Notes>
    <CVE>CVE-2023-45233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45233.html</URL>
        <Description>CVE-2023-45233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218883</URL>
        <Description>SUSE Bug 1218883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.</Note>
    </Notes>
    <CVE>CVE-2023-45234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45234.html</URL>
        <Description>CVE-2023-45234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218884</URL>
        <Description>SUSE Bug 1218884</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">EDK2's Network Package is susceptible to a buffer overflow vulnerability when





handling Server ID option 



 from a DHCPv6 proxy Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.</Note>
    </Notes>
    <CVE>CVE-2023-45235</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ovmf-tools-2017+git1510945757.b2662641d5-3.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260196-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45235.html</URL>
        <Description>CVE-2023-45235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218885</URL>
        <Description>SUSE Bug 1218885</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
