Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#61827 - [qemu] [Security] arbitrary code execution (CVE-2019-3812)

Attached to Project: Arch Linux
Opened by Morten Linderud (Foxboron) - Thursday, 21 February 2019, 13:21 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 November 2019, 11:12 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To No-one
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Summary
=======

The package qemu is vulnerable to arbitrary code execution via CVE-2019-3812.

Guidance
========

Apply patch from upstream.

References
==========

https://security.archlinux.org/AVG-914
https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c
This task depends upon

Closed by  Jan de Groot (JGC)
Tuesday, 05 November 2019, 11:12 GMT
Reason for closing:  Fixed

Loading...