SUSE: 2020:0568-1 moderate: ovmf
Summary
This update for ovmf fixes the following issues: Security issues fixed: - CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959). - CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072). - CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927). - CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969). - Enabled HTTPS-over-IPv6 (bsc#1153072). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-568=1 Package List: - SUSE Linux Enterprise Module for ...
Read the Full AdvisoryReferences
#1153072 #1163927 #1163959 #1163969
Cross- CVE-2019-14553 CVE-2019-14559 CVE-2019-14563
CVE-2019-14575
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
https://www.suse.com/security/cve/CVE-2019-14553.html
https://www.suse.com/security/cve/CVE-2019-14559.html
https://www.suse.com/security/cve/CVE-2019-14563.html
https://www.suse.com/security/cve/CVE-2019-14575.html
https://bugzilla.suse.com/1153072
https://bugzilla.suse.com/1163927
https://bugzilla.suse.com/1163959
https://bugzilla.suse.com/1163969