File _patchinfo of Package patchinfo.12243

<patchinfo incident="12243">
  <issue tracker="bnc" id="1143794">VUL-0: CVE-2019-14378: kvm,qemu:  heap buffer overflow during packet reassembly in slirp networking implementation</issue>
  <issue tracker="bnc" id="1135902">VUL-1: CVE-2019-12155: kvm,qemu: null pointer dereference while releasing spice resources</issue>
  <issue tracker="bnc" id="1140402">VUL-1: CVE-2019-13164: kvm,qemu: qemu-bridge-helper ACL can be bypassed when names are too long</issue>
  <issue tracker="cve" id="2019-13164"/>
  <issue tracker="cve" id="2019-14378"/>
  <issue tracker="cve" id="2019-12155"/>
  <category>security</category>
  <rating>important</rating>
  <packager>bfrogers</packager>
  <description>This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
</description>
  <summary>Security update for qemu</summary>
</patchinfo>
openSUSE Build Service is sponsored by