SUSE-SU-2020:0568-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:0568-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2020:0568-1
Related
Published
2020-03-03T10:36:50Z
Modified
2020-03-03T10:36:50Z
Summary
Security update for ovmf
Details

This update for ovmf fixes the following issues:

Security issues fixed:

  • CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
  • CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072).
  • CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
  • CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).
  • Enabled HTTPS-over-IPv6 (bsc#1153072).
References

Affected packages

SUSE:Linux Enterprise Module for Server Applications 15 SP1 / ovmf

Package

Name
ovmf
Purl
purl:rpm/suse/ovmf&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2017+git1510945757.b2662641d5-5.29.3

Ecosystem specific

{
    "binaries": [
        {
            "ovmf-tools": "2017+git1510945757.b2662641d5-5.29.3",
            "ovmf": "2017+git1510945757.b2662641d5-5.29.3",
            "qemu-ovmf-x86_64": "2017+git1510945757.b2662641d5-5.29.3",
            "qemu-uefi-aarch64": "2017+git1510945757.b2662641d5-5.29.3"
        }
    ]
}