Security update for ovmf
Announcement ID: | SUSE-SU-2019:0579-1 |
Rating: | important |
References: | #1127820 #1127821 #1127822 |
Cross-References: | CVE-2018-12178 CVE-2018-12180 CVE-2018-3630 |
Affected Products: |
|
An update that fixes three vulnerabilities is now available.
Description:
This update for ovmf fixes the following issues:
Security issues fixed:
- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead to memory read/write overrun (bsc#1127820).
- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821).
- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to bypass the chain of trust checks (bsc#1127822).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-579=1
Package List:
- SUSE Linux Enterprise Server 12-SP3 (aarch64 x86_64):
- ovmf-2017+git1492060560.b6d11d7c46-4.20.1
- ovmf-tools-2017+git1492060560.b6d11d7c46-4.20.1
- SUSE Linux Enterprise Server 12-SP3 (noarch):
- qemu-ovmf-x86_64-2017+git1492060560.b6d11d7c46-4.20.1
- qemu-uefi-aarch64-2017+git1492060560.b6d11d7c46-4.20.1