{"affected":[{"ecosystem_specific":{"binaries":[{"ovmf":"2017+git1510945757.b2662641d5-5.14.1","ovmf-tools":"2017+git1510945757.b2662641d5-5.14.1","qemu-ovmf-x86_64":"2017+git1510945757.b2662641d5-5.14.1","qemu-uefi-aarch64":"2017+git1510945757.b2662641d5-5.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15","name":"ovmf","purl":"pkg:rpm/suse/ovmf&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2017+git1510945757.b2662641d5-5.14.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ovmf fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2018-12180: Fixed a buffer overflow in BlockIo service, which could lead \n  to memory read/write overrun (bsc#1127820).\n- CVE-2018-12178: Fixed an improper DNS check upon receiving a new DNS packet (bsc#1127821).\n- CVE-2018-3630: Fixed a logic error in FV parsing which could allow a local attacker to \n  bypass the chain of trust checks (bsc#1127822).\n","id":"SUSE-SU-2019:0580-1","modified":"2019-03-11T12:06:24Z","published":"2019-03-11T12:06:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20190580-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1127822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-3630"}],"related":["CVE-2018-12178","CVE-2018-12180","CVE-2018-3630"],"summary":"Security update for ovmf","upstream":["CVE-2018-12178","CVE-2018-12180","CVE-2018-3630"]}