Processing commands for cont...@bugs.debian.org: > # will be fixed in DSA and needs fix in untstable > severity 910431 grave Bug #910431 [src:qemu] qemu: CVE-2018-10839: integer overflow leads to buffer overflow issue Ignoring request to change severity of Bug 910431 to the same value. > severity 910431 grave Bug #910431 [src:qemu] qemu: CVE-2018-10839: integer overflow leads to buffer overflow issue Ignoring request to change severity of Bug 910431 to the same value. > severity 911469 grave Bug #911469 [src:qemu] qemu: CVE-2018-17963: net: ignore packets with large size Ignoring request to change severity of Bug 911469 to the same value. > found 911469 1:2.8+dfsg-6 Bug #911469 [src:qemu] qemu: CVE-2018-17963: net: ignore packets with large size Marked as found in versions qemu/1:2.8+dfsg-6. > found 911468 1:2.8+dfsg-6 Bug #911468 [src:qemu] qemu: CVE-2018-17962: pcnet: integer overflow leads to buffer overflow Marked as found in versions qemu/1:2.8+dfsg-6. > thanks Stopping processing here.
Please contact me if you need assistance. -- 910431: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910431 911468: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911468 911469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911469 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems