Source: qemu
Version: 1:4.2-3
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

The following vulnerability was published for qemu.

CVE-2020-11102[0]:
| hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying
| of tx/rx buffers because the frame size is not validated against the
| r/w data length.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-11102
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102
[1] https://www.openwall.com/lists/oss-security/2020/04/06/1

Regards,
Salvatore

Reply via email to