Source: qemu
Version: 1:2.5+dfsg-5
Severity: important
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerability was published for qemu.

CVE-2016-2538[0]:
usb: integer overflow in remote NDIS control message handling

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-2538
[1] https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1303120
[3] 
http://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e

Please adjust the affected versions in the BTS as needed. I have only
checked the source for unstable so far.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to