Release date:
2025-11-21 09:17:56 UTC
Description:
- CVE-2023-45229: fix IPv6 malformed option handling to prevent parsing loop
- CVE-2023-45230: fix DHCPv6 ServerID length validation to prevent buffer overflow
- CVE-2023-45231: fix IPv6 Redirect bounds checks to avoid out-of-bounds access
- CVE-2023-45232: fix IPv6 destination option parsing to prevent infinite loop
- CVE-2023-45233: fix PadN option handling in IPv6 PXE processing to prevent loop
- CVE-2023-45234: fix DHCPv6 Advertise DNS Servers option parsing to prevent buffer overflow
- CVE-2023-45235: fix DHCPv6 proxy Advertise ServerID option parsing to prevent buffer overflow
Updated packages:
-
edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.tuxcare.els2.noarch.rpm
sha:8e2b31c55d99628098432c238dc603fb34258dfa0b3f00dccd45a85f26e5d3d3
-
edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.tuxcare.els2.noarch.rpm
sha:052ef45b37b4a06c390de14a9887373b751cc53d471806b1bac82d6eccc89345
-
edk2-tools-20221207gitfff6d81270b5-9.el9_2.tuxcare.els2.x86_64.rpm
sha:1bac215134f555b6d7c282f3fcfc11b67e049658502985a3f53a5087597aabf7
-
edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.tuxcare.els2.noarch.rpm
sha:528aaa026d8dedcb9071494f5e82cb19e5866c74a9629850bc433b281bb509f4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.