{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"ovmf-202105-3.4 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the ovmf-202105-3.4 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-11134","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11134-1.json"},{"category":"self","summary":"SUSE CVE CVE-2017-5731 page","url":"https://www.suse.com/security/cve/CVE-2017-5731/"},{"category":"self","summary":"SUSE CVE CVE-2017-5732 page","url":"https://www.suse.com/security/cve/CVE-2017-5732/"},{"category":"self","summary":"SUSE CVE CVE-2018-0739 page","url":"https://www.suse.com/security/cve/CVE-2018-0739/"},{"category":"self","summary":"SUSE CVE CVE-2018-12178 page","url":"https://www.suse.com/security/cve/CVE-2018-12178/"},{"category":"self","summary":"SUSE CVE CVE-2018-12180 page","url":"https://www.suse.com/security/cve/CVE-2018-12180/"},{"category":"self","summary":"SUSE CVE CVE-2018-12181 page","url":"https://www.suse.com/security/cve/CVE-2018-12181/"},{"category":"self","summary":"SUSE CVE CVE-2018-3613 page","url":"https://www.suse.com/security/cve/CVE-2018-3613/"},{"category":"self","summary":"SUSE CVE CVE-2018-3630 page","url":"https://www.suse.com/security/cve/CVE-2018-3630/"},{"category":"self","summary":"SUSE CVE CVE-2019-0160 page","url":"https://www.suse.com/security/cve/CVE-2019-0160/"},{"category":"self","summary":"SUSE CVE CVE-2019-0161 page","url":"https://www.suse.com/security/cve/CVE-2019-0161/"},{"category":"self","summary":"SUSE CVE CVE-2019-14553 page","url":"https://www.suse.com/security/cve/CVE-2019-14553/"},{"category":"self","summary":"SUSE CVE CVE-2019-14558 page","url":"https://www.suse.com/security/cve/CVE-2019-14558/"},{"category":"self","summary":"SUSE CVE CVE-2019-14559 page","url":"https://www.suse.com/security/cve/CVE-2019-14559/"},{"category":"self","summary":"SUSE CVE CVE-2019-14562 page","url":"https://www.suse.com/security/cve/CVE-2019-14562/"},{"category":"self","summary":"SUSE CVE CVE-2019-14563 page","url":"https://www.suse.com/security/cve/CVE-2019-14563/"},{"category":"self","summary":"SUSE CVE CVE-2019-14575 page","url":"https://www.suse.com/security/cve/CVE-2019-14575/"},{"category":"self","summary":"SUSE CVE CVE-2019-14584 page","url":"https://www.suse.com/security/cve/CVE-2019-14584/"},{"category":"self","summary":"SUSE CVE CVE-2019-14586 page","url":"https://www.suse.com/security/cve/CVE-2019-14586/"},{"category":"self","summary":"SUSE CVE CVE-2019-14587 page","url":"https://www.suse.com/security/cve/CVE-2019-14587/"},{"category":"self","summary":"SUSE CVE CVE-2021-28210 page","url":"https://www.suse.com/security/cve/CVE-2021-28210/"},{"category":"self","summary":"SUSE CVE CVE-2021-28211 page","url":"https://www.suse.com/security/cve/CVE-2021-28211/"}],"title":"ovmf-202105-3.4 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:11134-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"ovmf-202105-3.4.aarch64","product":{"name":"ovmf-202105-3.4.aarch64","product_id":"ovmf-202105-3.4.aarch64"}},{"category":"product_version","name":"ovmf-tools-202105-3.4.aarch64","product":{"name":"ovmf-tools-202105-3.4.aarch64","product_id":"ovmf-tools-202105-3.4.aarch64"}},{"category":"product_version","name":"qemu-ovmf-ia32-202105-3.4.aarch64","product":{"name":"qemu-ovmf-ia32-202105-3.4.aarch64","product_id":"qemu-ovmf-ia32-202105-3.4.aarch64"}},{"category":"product_version","name":"qemu-ovmf-x86_64-202105-3.4.aarch64","product":{"name":"qemu-ovmf-x86_64-202105-3.4.aarch64","product_id":"qemu-ovmf-x86_64-202105-3.4.aarch64"}},{"category":"product_version","name":"qemu-ovmf-x86_64-debug-202105-3.4.aarch64","product":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.aarch64","product_id":"qemu-ovmf-x86_64-debug-202105-3.4.aarch64"}},{"category":"product_version","name":"qemu-uefi-aarch32-202105-3.4.aarch64","product":{"name":"qemu-uefi-aarch32-202105-3.4.aarch64","product_id":"qemu-uefi-aarch32-202105-3.4.aarch64"}},{"category":"product_version","name":"qemu-uefi-aarch64-202105-3.4.aarch64","product":{"name":"qemu-uefi-aarch64-202105-3.4.aarch64","product_id":"qemu-uefi-aarch64-202105-3.4.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"ovmf-202105-3.4.ppc64le","product":{"name":"ovmf-202105-3.4.ppc64le","product_id":"ovmf-202105-3.4.ppc64le"}},{"category":"product_version","name":"ovmf-tools-202105-3.4.ppc64le","product":{"name":"ovmf-tools-202105-3.4.ppc64le","product_id":"ovmf-tools-202105-3.4.ppc64le"}},{"category":"product_version","name":"qemu-ovmf-ia32-202105-3.4.ppc64le","product":{"name":"qemu-ovmf-ia32-202105-3.4.ppc64le","product_id":"qemu-ovmf-ia32-202105-3.4.ppc64le"}},{"category":"product_version","name":"qemu-ovmf-x86_64-202105-3.4.ppc64le","product":{"name":"qemu-ovmf-x86_64-202105-3.4.ppc64le","product_id":"qemu-ovmf-x86_64-202105-3.4.ppc64le"}},{"category":"product_version","name":"qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","product":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","product_id":"qemu-ovmf-x86_64-debug-202105-3.4.ppc64le"}},{"category":"product_version","name":"qemu-uefi-aarch32-202105-3.4.ppc64le","product":{"name":"qemu-uefi-aarch32-202105-3.4.ppc64le","product_id":"qemu-uefi-aarch32-202105-3.4.ppc64le"}},{"category":"product_version","name":"qemu-uefi-aarch64-202105-3.4.ppc64le","product":{"name":"qemu-uefi-aarch64-202105-3.4.ppc64le","product_id":"qemu-uefi-aarch64-202105-3.4.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"ovmf-202105-3.4.s390x","product":{"name":"ovmf-202105-3.4.s390x","product_id":"ovmf-202105-3.4.s390x"}},{"category":"product_version","name":"ovmf-tools-202105-3.4.s390x","product":{"name":"ovmf-tools-202105-3.4.s390x","product_id":"ovmf-tools-202105-3.4.s390x"}},{"category":"product_version","name":"qemu-ovmf-ia32-202105-3.4.s390x","product":{"name":"qemu-ovmf-ia32-202105-3.4.s390x","product_id":"qemu-ovmf-ia32-202105-3.4.s390x"}},{"category":"product_version","name":"qemu-ovmf-x86_64-202105-3.4.s390x","product":{"name":"qemu-ovmf-x86_64-202105-3.4.s390x","product_id":"qemu-ovmf-x86_64-202105-3.4.s390x"}},{"category":"product_version","name":"qemu-ovmf-x86_64-debug-202105-3.4.s390x","product":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.s390x","product_id":"qemu-ovmf-x86_64-debug-202105-3.4.s390x"}},{"category":"product_version","name":"qemu-uefi-aarch32-202105-3.4.s390x","product":{"name":"qemu-uefi-aarch32-202105-3.4.s390x","product_id":"qemu-uefi-aarch32-202105-3.4.s390x"}},{"category":"product_version","name":"qemu-uefi-aarch64-202105-3.4.s390x","product":{"name":"qemu-uefi-aarch64-202105-3.4.s390x","product_id":"qemu-uefi-aarch64-202105-3.4.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"ovmf-202105-3.4.x86_64","product":{"name":"ovmf-202105-3.4.x86_64","product_id":"ovmf-202105-3.4.x86_64"}},{"category":"product_version","name":"ovmf-tools-202105-3.4.x86_64","product":{"name":"ovmf-tools-202105-3.4.x86_64","product_id":"ovmf-tools-202105-3.4.x86_64"}},{"category":"product_version","name":"qemu-ovmf-ia32-202105-3.4.x86_64","product":{"name":"qemu-ovmf-ia32-202105-3.4.x86_64","product_id":"qemu-ovmf-ia32-202105-3.4.x86_64"}},{"category":"product_version","name":"qemu-ovmf-x86_64-202105-3.4.x86_64","product":{"name":"qemu-ovmf-x86_64-202105-3.4.x86_64","product_id":"qemu-ovmf-x86_64-202105-3.4.x86_64"}},{"category":"product_version","name":"qemu-ovmf-x86_64-debug-202105-3.4.x86_64","product":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.x86_64","product_id":"qemu-ovmf-x86_64-debug-202105-3.4.x86_64"}},{"category":"product_version","name":"qemu-uefi-aarch32-202105-3.4.x86_64","product":{"name":"qemu-uefi-aarch32-202105-3.4.x86_64","product_id":"qemu-uefi-aarch32-202105-3.4.x86_64"}},{"category":"product_version","name":"qemu-uefi-aarch64-202105-3.4.x86_64","product":{"name":"qemu-uefi-aarch64-202105-3.4.x86_64","product_id":"qemu-uefi-aarch64-202105-3.4.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"ovmf-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-202105-3.4.aarch64"},"product_reference":"ovmf-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le"},"product_reference":"ovmf-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-202105-3.4.s390x"},"product_reference":"ovmf-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-202105-3.4.x86_64"},"product_reference":"ovmf-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-tools-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64"},"product_reference":"ovmf-tools-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-tools-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le"},"product_reference":"ovmf-tools-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-tools-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x"},"product_reference":"ovmf-tools-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"ovmf-tools-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64"},"product_reference":"ovmf-tools-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-ia32-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64"},"product_reference":"qemu-ovmf-ia32-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-ia32-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le"},"product_reference":"qemu-ovmf-ia32-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-ia32-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x"},"product_reference":"qemu-ovmf-ia32-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-ia32-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64"},"product_reference":"qemu-ovmf-ia32-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64"},"product_reference":"qemu-ovmf-x86_64-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le"},"product_reference":"qemu-ovmf-x86_64-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x"},"product_reference":"qemu-ovmf-x86_64-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64"},"product_reference":"qemu-ovmf-x86_64-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64"},"product_reference":"qemu-ovmf-x86_64-debug-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le"},"product_reference":"qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x"},"product_reference":"qemu-ovmf-x86_64-debug-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-ovmf-x86_64-debug-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64"},"product_reference":"qemu-ovmf-x86_64-debug-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch32-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64"},"product_reference":"qemu-uefi-aarch32-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch32-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le"},"product_reference":"qemu-uefi-aarch32-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch32-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x"},"product_reference":"qemu-uefi-aarch32-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch32-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64"},"product_reference":"qemu-uefi-aarch32-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch64-202105-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64"},"product_reference":"qemu-uefi-aarch64-202105-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch64-202105-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le"},"product_reference":"qemu-uefi-aarch64-202105-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch64-202105-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x"},"product_reference":"qemu-uefi-aarch64-202105-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"qemu-uefi-aarch64-202105-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"},"product_reference":"qemu-uefi-aarch64-202105-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2017-5731","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5731"}],"notes":[{"category":"general","text":"Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5731","url":"https://www.suse.com/security/cve/CVE-2017-5731"},{"category":"external","summary":"SUSE Bug 1115917 for CVE-2017-5731","url":"https://bugzilla.suse.com/1115917"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2017-5731"},{"cve":"CVE-2017-5732","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5732"}],"notes":[{"category":"general","text":"DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5732","url":"https://www.suse.com/security/cve/CVE-2017-5732"},{"category":"external","summary":"SUSE Bug 1115917 for CVE-2017-5732","url":"https://bugzilla.suse.com/1115917"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-5732"},{"cve":"CVE-2018-0739","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-0739"}],"notes":[{"category":"general","text":"Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-0739","url":"https://www.suse.com/security/cve/CVE-2018-0739"},{"category":"external","summary":"SUSE Bug 1087102 for CVE-2018-0739","url":"https://bugzilla.suse.com/1087102"},{"category":"external","summary":"SUSE Bug 1089997 for CVE-2018-0739","url":"https://bugzilla.suse.com/1089997"},{"category":"external","summary":"SUSE Bug 1094291 for CVE-2018-0739","url":"https://bugzilla.suse.com/1094291"},{"category":"external","summary":"SUSE Bug 1108542 for CVE-2018-0739","url":"https://bugzilla.suse.com/1108542"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-0739"},{"cve":"CVE-2018-12178","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-12178"}],"notes":[{"category":"general","text":"Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-12178","url":"https://www.suse.com/security/cve/CVE-2018-12178"},{"category":"external","summary":"SUSE Bug 1127821 for CVE-2018-12178","url":"https://bugzilla.suse.com/1127821"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":9.1,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"critical"}],"title":"CVE-2018-12178"},{"cve":"CVE-2018-12180","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-12180"}],"notes":[{"category":"general","text":"Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-12180","url":"https://www.suse.com/security/cve/CVE-2018-12180"},{"category":"external","summary":"SUSE Bug 1127820 for CVE-2018-12180","url":"https://bugzilla.suse.com/1127820"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.3,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2018-12180"},{"cve":"CVE-2018-12181","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-12181"}],"notes":[{"category":"general","text":"Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-12181","url":"https://www.suse.com/security/cve/CVE-2018-12181"},{"category":"external","summary":"SUSE Bug 1128503 for CVE-2018-12181","url":"https://bugzilla.suse.com/1128503"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-12181"},{"cve":"CVE-2018-3613","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-3613"}],"notes":[{"category":"general","text":"Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-3613","url":"https://www.suse.com/security/cve/CVE-2018-3613"},{"category":"external","summary":"SUSE Bug 1115916 for CVE-2018-3613","url":"https://bugzilla.suse.com/1115916"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-3613"},{"cve":"CVE-2018-3630","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-3630"}],"notes":[{"category":"general","text":"DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-3630","url":"https://www.suse.com/security/cve/CVE-2018-3630"},{"category":"external","summary":"SUSE Bug 1127822 for CVE-2018-3630","url":"https://bugzilla.suse.com/1127822"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.6,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2018-3630"},{"cve":"CVE-2019-0160","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-0160"}],"notes":[{"category":"general","text":"Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-0160","url":"https://www.suse.com/security/cve/CVE-2019-0160"},{"category":"external","summary":"SUSE Bug 1130267 for CVE-2019-0160","url":"https://bugzilla.suse.com/1130267"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-0160"},{"cve":"CVE-2019-0161","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-0161"}],"notes":[{"category":"general","text":"Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-0161","url":"https://www.suse.com/security/cve/CVE-2019-0161"},{"category":"external","summary":"SUSE Bug 1131361 for CVE-2019-0161","url":"https://bugzilla.suse.com/1131361"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-0161"},{"cve":"CVE-2019-14553","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14553"}],"notes":[{"category":"general","text":"Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14553","url":"https://www.suse.com/security/cve/CVE-2019-14553"},{"category":"external","summary":"SUSE Bug 1153072 for CVE-2019-14553","url":"https://bugzilla.suse.com/1153072"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.2,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2019-14553"},{"cve":"CVE-2019-14558","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14558"}],"notes":[{"category":"general","text":"Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14558","url":"https://www.suse.com/security/cve/CVE-2019-14558"},{"category":"external","summary":"SUSE Bug 1168193 for CVE-2019-14558","url":"https://bugzilla.suse.com/1168193"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14558"},{"cve":"CVE-2019-14559","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14559"}],"notes":[{"category":"general","text":"Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14559","url":"https://www.suse.com/security/cve/CVE-2019-14559"},{"category":"external","summary":"SUSE Bug 1163927 for CVE-2019-14559","url":"https://bugzilla.suse.com/1163927"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14559"},{"cve":"CVE-2019-14562","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14562"}],"notes":[{"category":"general","text":"Integer overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14562","url":"https://www.suse.com/security/cve/CVE-2019-14562"},{"category":"external","summary":"SUSE Bug 1175476 for CVE-2019-14562","url":"https://bugzilla.suse.com/1175476"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.6,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2019-14562"},{"cve":"CVE-2019-14563","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14563"}],"notes":[{"category":"general","text":"Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14563","url":"https://www.suse.com/security/cve/CVE-2019-14563"},{"category":"external","summary":"SUSE Bug 1163959 for CVE-2019-14563","url":"https://bugzilla.suse.com/1163959"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14563"},{"cve":"CVE-2019-14575","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14575"}],"notes":[{"category":"general","text":"Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14575","url":"https://www.suse.com/security/cve/CVE-2019-14575"},{"category":"external","summary":"SUSE Bug 1163969 for CVE-2019-14575","url":"https://bugzilla.suse.com/1163969"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2019-14575"},{"cve":"CVE-2019-14584","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14584"}],"notes":[{"category":"general","text":"Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14584","url":"https://www.suse.com/security/cve/CVE-2019-14584"},{"category":"external","summary":"SUSE Bug 1177789 for CVE-2019-14584","url":"https://bugzilla.suse.com/1177789"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14584"},{"cve":"CVE-2019-14586","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14586"}],"notes":[{"category":"general","text":"Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14586","url":"https://www.suse.com/security/cve/CVE-2019-14586"},{"category":"external","summary":"SUSE Bug 1168189 for CVE-2019-14586","url":"https://bugzilla.suse.com/1168189"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14586"},{"cve":"CVE-2019-14587","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14587"}],"notes":[{"category":"general","text":"Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-14587","url":"https://www.suse.com/security/cve/CVE-2019-14587"},{"category":"external","summary":"SUSE Bug 1168192 for CVE-2019-14587","url":"https://bugzilla.suse.com/1168192"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.2,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-14587"},{"cve":"CVE-2021-28210","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-28210"}],"notes":[{"category":"general","text":"An unlimited recursion in DxeCore in EDK II.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-28210","url":"https://www.suse.com/security/cve/CVE-2021-28210"},{"category":"external","summary":"SUSE Bug 1183579 for CVE-2021-28210","url":"https://bugzilla.suse.com/1183579"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2021-28210"},{"cve":"CVE-2021-28211","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-28211"}],"notes":[{"category":"general","text":"A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-28211","url":"https://www.suse.com/security/cve/CVE-2021-28211"},{"category":"external","summary":"SUSE Bug 1183578 for CVE-2021-28211","url":"https://bugzilla.suse.com/1183578"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:ovmf-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-202105-3.4.x86_64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.aarch64","openSUSE Tumbleweed:ovmf-tools-202105-3.4.ppc64le","openSUSE Tumbleweed:ovmf-tools-202105-3.4.s390x","openSUSE Tumbleweed:ovmf-tools-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.s390x","openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4.x86_64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.aarch64","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.ppc64le","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.s390x","openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2021-28211"}]}