SUSE: 2019:0581-1 important: ovmf
Summary
This update for ovmf fixes the following issues: Security issues fixed: - CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead to memory read/write overrun (bsc#1127820). - CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821). - CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to bypass the chain of trust checks (bsc#1127822). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-581=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-581=1 Package List: - SUSE Linux Enterprise Server 12-SP4 (aarch64 x86_64): ovmf-2017+git1510945757.b2662641d5-3.8.3 ovmf-tools-2017+git1510945757.b2662641d5-3.8.3 - SUSE Linux Enterprise Server 12-SP4 (noarch): qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3 qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.8.3 - SUSE Linux Enterprise Desktop 12-SP4 (noarch): qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.8.3
References
#1127820 #1127821 #1127822
Cross- CVE-2018-12178 CVE-2018-12180 CVE-2018-3630
Affected Products:
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Desktop 12-SP4
https://www.suse.com/security/cve/CVE-2018-12178.html
https://www.suse.com/security/cve/CVE-2018-12180.html
https://www.suse.com/security/cve/CVE-2018-3630.html
https://bugzilla.suse.com/1127820
https://bugzilla.suse.com/1127821
https://bugzilla.suse.com/1127822