File _patchinfo of Package patchinfo.6568
<patchinfo incident="6568">
<issue id="1077330" tracker="bnc">ovmf-x86_64-suse-code.bin doesn't contain the proper SLES signkey</issue>
<issue id="1094291" tracker="bnc">SLE12-SP2: Update openssl in OVMF to 1.0.2o</issue>
<issue id="2018-0739" tracker="cve" />
<issue tracker="bnc" id="1163927">VUL-0: CVE-2019-14559: ovmf: memory leak in ArpOnFrameRcvdDpc by sending invalid ARP packets</issue>
<issue tracker="bnc" id="1163959">VUL-1: CVE-2019-14563: ovmf: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib may lead to memory corruption</issue>
<issue tracker="bnc" id="1163969">VUL-0: CVE-2019-14575: ovmf: DxeImageVerificationHandler() fails open in case of dbx signature check</issue>
<issue tracker="cve" id="2019-14559"/>
<issue tracker="cve" id="2019-14563"/>
<issue tracker="cve" id="2019-14575"/>
<category>security</category>
<rating>moderate</rating>
<packager>gary_lin</packager>
<summary>Security update for ovmf</summary>
<description>This update for ovmf fixes the following issues:
Security issues fixed:
- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types recursive definition depth (bsc#1094291).
- CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
- CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
- CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).
Bug fixes:
- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the better compatibility. (bsc#1077330)
</description>
</patchinfo>