Processing commands for cont...@bugs.debian.org:

> # will be fixed in DSA and needs fix in untstable
> severity 910431 grave
Bug #910431 [src:qemu] qemu: CVE-2018-10839: integer overflow leads to buffer 
overflow issue
Ignoring request to change severity of Bug 910431 to the same value.
> severity 910431 grave
Bug #910431 [src:qemu] qemu: CVE-2018-10839: integer overflow leads to buffer 
overflow issue
Ignoring request to change severity of Bug 910431 to the same value.
> severity 911469 grave
Bug #911469 [src:qemu] qemu: CVE-2018-17963: net: ignore packets with large size
Ignoring request to change severity of Bug 911469 to the same value.
> found 911469 1:2.8+dfsg-6
Bug #911469 [src:qemu] qemu: CVE-2018-17963: net: ignore packets with large size
Marked as found in versions qemu/1:2.8+dfsg-6.
> found 911468 1:2.8+dfsg-6
Bug #911468 [src:qemu] qemu: CVE-2018-17962: pcnet: integer overflow leads to 
buffer overflow
Marked as found in versions qemu/1:2.8+dfsg-6.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
910431: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910431
911468: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911468
911469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911469
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to