Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#61827 - [qemu] [Security] arbitrary code execution (CVE-2019-3812)
Attached to Project:
Arch Linux
Opened by Morten Linderud (Foxboron) - Thursday, 21 February 2019, 13:21 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 November 2019, 11:12 GMT
Opened by Morten Linderud (Foxboron) - Thursday, 21 February 2019, 13:21 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 November 2019, 11:12 GMT
|
DetailsSummary
======= The package qemu is vulnerable to arbitrary code execution via CVE-2019-3812. Guidance ======== Apply patch from upstream. References ========== https://security.archlinux.org/AVG-914 https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c |
This task depends upon