<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ovmf-202105-3.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11134-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ovmf-202105-3.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ovmf-202105-3.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11134</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5731/</URL>
      <Description>SUSE CVE CVE-2017-5731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5732/</URL>
      <Description>SUSE CVE CVE-2017-5732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0739/</URL>
      <Description>SUSE CVE CVE-2018-0739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12178/</URL>
      <Description>SUSE CVE CVE-2018-12178 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12180/</URL>
      <Description>SUSE CVE CVE-2018-12180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12181/</URL>
      <Description>SUSE CVE CVE-2018-12181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3613/</URL>
      <Description>SUSE CVE CVE-2018-3613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-3630/</URL>
      <Description>SUSE CVE CVE-2018-3630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-0160/</URL>
      <Description>SUSE CVE CVE-2019-0160 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-0161/</URL>
      <Description>SUSE CVE CVE-2019-0161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14553/</URL>
      <Description>SUSE CVE CVE-2019-14553 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14558/</URL>
      <Description>SUSE CVE CVE-2019-14558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14559/</URL>
      <Description>SUSE CVE CVE-2019-14559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14562/</URL>
      <Description>SUSE CVE CVE-2019-14562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14563/</URL>
      <Description>SUSE CVE CVE-2019-14563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14575/</URL>
      <Description>SUSE CVE CVE-2019-14575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14584/</URL>
      <Description>SUSE CVE CVE-2019-14584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14586/</URL>
      <Description>SUSE CVE CVE-2019-14586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14587/</URL>
      <Description>SUSE CVE CVE-2019-14587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28210/</URL>
      <Description>SUSE CVE CVE-2021-28210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28211/</URL>
      <Description>SUSE CVE CVE-2021-28211 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-202105-3.4">
      <FullProductName ProductID="ovmf-202105-3.4">ovmf-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ovmf-tools-202105-3.4">
      <FullProductName ProductID="ovmf-tools-202105-3.4">ovmf-tools-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-ia32-202105-3.4">
      <FullProductName ProductID="qemu-ovmf-ia32-202105-3.4">qemu-ovmf-ia32-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-202105-3.4">
      <FullProductName ProductID="qemu-ovmf-x86_64-202105-3.4">qemu-ovmf-x86_64-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-ovmf-x86_64-debug-202105-3.4">
      <FullProductName ProductID="qemu-ovmf-x86_64-debug-202105-3.4">qemu-ovmf-x86_64-debug-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch32-202105-3.4">
      <FullProductName ProductID="qemu-uefi-aarch32-202105-3.4">qemu-uefi-aarch32-202105-3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qemu-uefi-aarch64-202105-3.4">
      <FullProductName ProductID="qemu-uefi-aarch64-202105-3.4">qemu-uefi-aarch64-202105-3.4</FullProductName>
    </Branch>
    <Relationship ProductReference="ovmf-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ovmf-202105-3.4">ovmf-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ovmf-tools-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ovmf-tools-202105-3.4">ovmf-tools-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-ia32-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4">qemu-ovmf-ia32-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4">qemu-ovmf-x86_64-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-ovmf-x86_64-debug-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4">qemu-ovmf-x86_64-debug-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch32-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4">qemu-uefi-aarch32-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="qemu-uefi-aarch64-202105-3.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4">qemu-uefi-aarch64-202105-3.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.</Note>
    </Notes>
    <CVE>CVE-2017-5731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5731.html</URL>
        <Description>CVE-2017-5731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115917</URL>
        <Description>SUSE Bug 1115917</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2017-5732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5732.html</URL>
        <Description>CVE-2017-5732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115917</URL>
        <Description>SUSE Bug 1115917</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).</Note>
    </Notes>
    <CVE>CVE-2018-0739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0739.html</URL>
        <Description>CVE-2018-0739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087102</URL>
        <Description>SUSE Bug 1087102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089997</URL>
        <Description>SUSE Bug 1089997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094291</URL>
        <Description>SUSE Bug 1094291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108542</URL>
        <Description>SUSE Bug 1108542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.</Note>
    </Notes>
    <CVE>CVE-2018-12178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12178.html</URL>
        <Description>CVE-2018-12178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127821</URL>
        <Description>SUSE Bug 1127821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.</Note>
    </Notes>
    <CVE>CVE-2018-12180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12180.html</URL>
        <Description>CVE-2018-12180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127820</URL>
        <Description>SUSE Bug 1127820</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.</Note>
    </Notes>
    <CVE>CVE-2018-12181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12181.html</URL>
        <Description>CVE-2018-12181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128503</URL>
        <Description>SUSE Bug 1128503</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.</Note>
    </Notes>
    <CVE>CVE-2018-3613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3613.html</URL>
        <Description>CVE-2018-3613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115916</URL>
        <Description>SUSE Bug 1115916</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2018-3630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-3630.html</URL>
        <Description>CVE-2018-3630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127822</URL>
        <Description>SUSE Bug 1127822</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.</Note>
    </Notes>
    <CVE>CVE-2019-0160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0160.html</URL>
        <Description>CVE-2019-0160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130267</URL>
        <Description>SUSE Bug 1130267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.</Note>
    </Notes>
    <CVE>CVE-2019-0161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0161.html</URL>
        <Description>CVE-2019-0161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131361</URL>
        <Description>SUSE Bug 1131361</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.</Note>
    </Notes>
    <CVE>CVE-2019-14553</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14553.html</URL>
        <Description>CVE-2019-14553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153072</URL>
        <Description>SUSE Bug 1153072</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 &amp; 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2019-14558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14558.html</URL>
        <Description>CVE-2019-14558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168193</URL>
        <Description>SUSE Bug 1168193</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.</Note>
    </Notes>
    <CVE>CVE-2019-14559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14559.html</URL>
        <Description>CVE-2019-14559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163927</URL>
        <Description>SUSE Bug 1163927</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.</Note>
    </Notes>
    <CVE>CVE-2019-14562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14562.html</URL>
        <Description>CVE-2019-14562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175476</URL>
        <Description>SUSE Bug 1175476</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.</Note>
    </Notes>
    <CVE>CVE-2019-14563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14563.html</URL>
        <Description>CVE-2019-14563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163959</URL>
        <Description>SUSE Bug 1163959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.</Note>
    </Notes>
    <CVE>CVE-2019-14575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14575.html</URL>
        <Description>CVE-2019-14575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163969</URL>
        <Description>SUSE Bug 1163969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.</Note>
    </Notes>
    <CVE>CVE-2019-14584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14584.html</URL>
        <Description>CVE-2019-14584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177789</URL>
        <Description>SUSE Bug 1177789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2019-14586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14586.html</URL>
        <Description>CVE-2019-14586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168189</URL>
        <Description>SUSE Bug 1168189</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2019-14587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14587.html</URL>
        <Description>CVE-2019-14587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168192</URL>
        <Description>SUSE Bug 1168192</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An unlimited recursion in DxeCore in EDK II.</Note>
    </Notes>
    <CVE>CVE-2021-28210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28210.html</URL>
        <Description>CVE-2021-28210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183579</URL>
        <Description>SUSE Bug 1183579</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.</Note>
    </Notes>
    <CVE>CVE-2021-28211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ovmf-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:ovmf-tools-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-ia32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-ovmf-x86_64-debug-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch32-202105-3.4</ProductID>
        <ProductID>openSUSE Tumbleweed:qemu-uefi-aarch64-202105-3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28211.html</URL>
        <Description>CVE-2021-28211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183578</URL>
        <Description>SUSE Bug 1183578</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
