Security update for ovmf

SUSE Security Update: Security update for ovmf
Announcement ID: SUSE-SU-2020:0699-1
Rating: low
References: #1153072 #1163927 #1163959 #1163969
Cross-References:CVE-2019-14553 CVE-2019-14559 CVE-2019-14563 CVE-2019-14575
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5
  • SUSE Linux Enterprise Server 12-SP4

An update that fixes four vulnerabilities is now available.

Description:

This update for ovmf fixes the following issues:
Security issues fixed:

  • CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
  • CVE-2019-14553: Fixed the TLS certification verification in HTTPS-over-IPv6 boot sequences (bsc#1153072).
  • CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
  • CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).
  • Enabled HTTPS-over-IPv6 (bsc#1153072).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-699=1
  • SUSE Linux Enterprise Server 12-SP4:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-699=1

Package List:

  • SUSE Linux Enterprise Server 12-SP5 (aarch64 x86_64):
    • ovmf-2017+git1510945757.b2662641d5-3.23.1
    • ovmf-tools-2017+git1510945757.b2662641d5-3.23.1
  • SUSE Linux Enterprise Server 12-SP5 (noarch):
    • qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.23.1
    • qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.23.1
  • SUSE Linux Enterprise Server 12-SP4 (aarch64 x86_64):
    • ovmf-2017+git1510945757.b2662641d5-3.23.1
    • ovmf-tools-2017+git1510945757.b2662641d5-3.23.1
  • SUSE Linux Enterprise Server 12-SP4 (noarch):
    • qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.23.1
    • qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.23.1

References: