Security update for qemu

This update fixes the following security issues:

- Enforce receive packet size, thus eliminating buffer overflow and
potential security issue. (bsc#957162 CVE-2015-7512)
- Infinite loop in processing command block list. CVE-2015-8345 (bsc#956829):

This update also fixes a non-security bug:
- Due to space restrictions in limited bios data areas, don't create
mptable if vcpu count is "high" (ie more than ~19). (bsc#954864)
(No supported guests are negatively impacted by this change, which
is taken from upstream seabios)

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#957162
VUL-0: CVE-2015-7512: kvm, qemu: net: pcnet: buffer overflow in non-loopback mode
bnc#954864
no bootable device reported on KVM guest with large number of processors assigned
bnc#956829
VUL-0: CVE-2015-8345: qemu: net: eepro100: infinite loop in processing command block list
Selected Binaries
openSUSE Build Service is sponsored by