Source: qemu Version: 1:2.1+dfsg-11 Severity: important Tags: security upstream
Hi, the following vulnerability was published for qemu. CVE-2016-6835[0]: |buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device |emulation If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-6835 [1] http://www.openwall.com/lists/oss-security/2016/08/11/7 Please adjust the affected versions in the BTS as needed. Regards, Salvatore