Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#61729 - [electrum] arbitrary attacker-controlled message dialogs spreading malware
Attached to Project:
Community Packages
Opened by David Parrish (dmp1ce) - Tuesday, 12 February 2019, 01:16 GMT
Last edited by Santiago Torres (sangy) - Tuesday, 12 February 2019, 04:04 GMT
Opened by David Parrish (dmp1ce) - Tuesday, 12 February 2019, 01:16 GMT
Last edited by Santiago Torres (sangy) - Tuesday, 12 February 2019, 04:04 GMT
|
DetailsDescription: Electrum has an actively exploited security vulnerability. https://github.com/spesmilo/electrum/issues/4968
A release is out and the package is marked as out-of-date but I was still directed to create an issue from IRC. Additional info: * Versions below 3.3.3 are effected. |
This task depends upon
Closed by Santiago Torres (sangy)
Tuesday, 12 February 2019, 04:04 GMT
Reason for closing: Fixed
Additional comments about closing: 3.3.3-1 is out
Tuesday, 12 February 2019, 04:04 GMT
Reason for closing: Fixed
Additional comments about closing: 3.3.3-1 is out
Thank you for reporting this security vulnerability. Re-assigning to the Security component for easier tracking.
> I was still directed to create an issue from IRC.
You may be happy to know you can reach the security team at #archlinux-security as well. :)