File _patchinfo of Package patchinfo.12243
<patchinfo incident="12243">
<issue tracker="bnc" id="1143794">VUL-0: CVE-2019-14378: kvm,qemu: heap buffer overflow during packet reassembly in slirp networking implementation</issue>
<issue tracker="bnc" id="1135902">VUL-1: CVE-2019-12155: kvm,qemu: null pointer dereference while releasing spice resources</issue>
<issue tracker="bnc" id="1140402">VUL-1: CVE-2019-13164: kvm,qemu: qemu-bridge-helper ACL can be bypassed when names are too long</issue>
<issue tracker="cve" id="2019-13164"/>
<issue tracker="cve" id="2019-14378"/>
<issue tracker="cve" id="2019-12155"/>
<category>security</category>
<rating>important</rating>
<packager>bfrogers</packager>
<description>This update for qemu fixes the following issues:
Security issues fixed:
- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
</description>
<summary>Security update for qemu</summary>
</patchinfo>