File _patchinfo of Package patchinfo.436

<patchinfo incident="436">
  <packager>charlesa</packager>
  <issue tracker="fate" id="310510"></issue>
  <issue tracker="bnc" id="753165"></issue>
  <issue tracker="bnc" id="740165"></issue>
  <issue tracker="bnc" id="746702"></issue>
  <issue tracker="bnc" id="744771"></issue>
  <issue tracker="bnc" id="745005"></issue>
  <issue tracker="bnc" id="745367"></issue>
  <issue tracker="bnc" id="745880"></issue>
  <issue tracker="bnc" id="747331"></issue>
  <issue tracker="cve" id="CVE-2012-0029"></issue>
  <issue tracker="bnc" id="743414"></issue>
  <issue tracker="bnc" id="744014"></issue>
  <issue tracker="bnc" id="745221"></issue>
  <category>security</category>
  <rating>low</rating>
  <summary>Xen: Bugfix update</summary>
  <description>This is a XEN bugfix update fixing lots of bugs
and one security issue.

CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.</description>
  <reboot_needed/>
</patchinfo>
openSUSE Build Service is sponsored by