Security update for ovmf

SUSE Security Update: Security update for ovmf
Announcement ID: SUSE-SU-2020:0568-1
Rating: moderate
References: #1153072 #1163927 #1163959 #1163969
Cross-References:CVE-2019-14553 CVE-2019-14559 CVE-2019-14563 CVE-2019-14575
Affected Products:
  • SUSE Linux Enterprise Module for Server Applications 15-SP1

An update that fixes four vulnerabilities is now available.

Description:

This update for ovmf fixes the following issues:
Security issues fixed:

  • CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
  • CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072).
  • CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
  • CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).
  • Enabled HTTPS-over-IPv6 (bsc#1153072).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Server Applications 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-568=1

Package List:

  • SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 x86_64):
    • ovmf-2017+git1510945757.b2662641d5-5.29.3
    • ovmf-tools-2017+git1510945757.b2662641d5-5.29.3
  • SUSE Linux Enterprise Module for Server Applications 15-SP1 (noarch):
    • qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-5.29.3
    • qemu-uefi-aarch64-2017+git1510945757.b2662641d5-5.29.3

References: