SUSE: 2020:0699-1 ovmf
Summary
This update for ovmf fixes the following issues: Security issues fixed: - CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959). - CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072). - CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927). - CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969). - Enabled HTTPS-over-IPv6 (bsc#1153072). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-699=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-699=1 ...
Read the Full AdvisoryReferences
#1153072 #1163927 #1163959 #1163969
Cross- CVE-2019-14553 CVE-2019-14559 CVE-2019-14563
CVE-2019-14575
Affected Products:
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4
https://www.suse.com/security/cve/CVE-2019-14553.html
https://www.suse.com/security/cve/CVE-2019-14559.html
https://www.suse.com/security/cve/CVE-2019-14563.html
https://www.suse.com/security/cve/CVE-2019-14575.html
https://bugzilla.suse.com/1153072
https://bugzilla.suse.com/1163927
https://bugzilla.suse.com/1163959
https://bugzilla.suse.com/1163969