File _patchinfo of Package patchinfo.1641
<patchinfo incident="1641">
<issue id="957162" tracker="bnc"> CVE-2015-7512: kvm, qemu: net: pcnet: buffer overflow in non-loopback mode</issue>
<issue id="953187" tracker="bnc">kvmclock issue during live migration (clock moving backward)</issue>
<issue id="947164" tracker="bnc">L3: kvmclock issue during live migration (clock moving backward)</issue>
<issue id="956829" tracker="bnc"> CVE-2015-8345: qemu: net: eepro100: infinite loop in processing command block list</issue>
<issue id="CVE-2015-8345" tracker="cve" />
<issue id="CVE-2015-7512" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>bfrogers</packager>
<description>
This update fixes the following security issues:
- Enforce receive packet size, thus eliminating buffer overflow and
potential security issue. (bsc#957162 CVE-2015-7512)
- Infinite loop in processing command block list. CVE-2015-8345 (bsc#956829):
Also a non-security bug fixed:
- Fix cases of wrong clock values in kvmclock timekeeping (bsc#947164 and bsc#953187)
</description>
<summary>Security update for qemu</summary>
</patchinfo>