File _patchinfo of Package patchinfo.436
<patchinfo incident="436"> <packager>charlesa</packager> <issue tracker="fate" id="310510"></issue> <issue tracker="bnc" id="753165"></issue> <issue tracker="bnc" id="740165"></issue> <issue tracker="bnc" id="746702"></issue> <issue tracker="bnc" id="744771"></issue> <issue tracker="bnc" id="745005"></issue> <issue tracker="bnc" id="745367"></issue> <issue tracker="bnc" id="745880"></issue> <issue tracker="bnc" id="747331"></issue> <issue tracker="cve" id="CVE-2012-0029"></issue> <issue tracker="bnc" id="743414"></issue> <issue tracker="bnc" id="744014"></issue> <issue tracker="bnc" id="745221"></issue> <category>security</category> <rating>low</rating> <summary>Xen: Bugfix update</summary> <description>This is a XEN bugfix update fixing lots of bugs and one security issue. CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.</description> <reboot_needed/> </patchinfo>