SUSE-SU-2019:0580-1: important: Security update for ovmf
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Mar 11 11:10:10 MDT 2019
SUSE Security Update: Security update for ovmf
______________________________________________________________________________
Announcement ID: SUSE-SU-2019:0580-1
Rating: important
References: #1127820 #1127821 #1127822
Cross-References: CVE-2018-12178 CVE-2018-12180 CVE-2018-3630
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for ovmf fixes the following issues:
Security issues fixed:
- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could
lead to memory read/write overrun (bsc#1127820).
- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS
packet (bsc#1127821).
- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a
local attacker to bypass the chain of trust checks (bsc#1127822).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Server Applications 15:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-580=1
Package List:
- SUSE Linux Enterprise Module for Server Applications 15 (aarch64 x86_64):
ovmf-2017+git1510945757.b2662641d5-5.14.1
ovmf-tools-2017+git1510945757.b2662641d5-5.14.1
- SUSE Linux Enterprise Module for Server Applications 15 (noarch):
qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-5.14.1
qemu-uefi-aarch64-2017+git1510945757.b2662641d5-5.14.1
References:
https://www.suse.com/security/cve/CVE-2018-12178.html
https://www.suse.com/security/cve/CVE-2018-12180.html
https://www.suse.com/security/cve/CVE-2018-3630.html
https://bugzilla.suse.com/1127820
https://bugzilla.suse.com/1127821
https://bugzilla.suse.com/1127822
More information about the sle-updates
mailing list