Files
poky/meta/recipes-devtools
Yogita Urade 8c533e9242 qemu: fix CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info'
command. A specially crafted image file containing a `json:{}`
value describing block devices in QMP could cause the qemu-img
process on the host to consume large amounts of memory or CPU time,
leading to denial of service or read/write to an existing external file

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-4467

Upstream Patches:
bd385a5298
2eb42a728d
7e1110664e
6bc30f1949
7ead946998

(From OE-Core rev: 0e309919b8807950cebc8924fc1e15763548b1f1)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-09-03 05:39:12 -07:00
..
2024-01-21 12:27:12 +00:00
2023-07-30 07:54:44 +01:00
2024-03-01 09:28:51 +00:00
2024-02-08 17:12:54 +00:00
2024-02-03 22:08:26 +00:00
2023-05-05 11:07:25 +01:00
2024-07-03 06:28:37 -07:00
2024-03-05 12:24:49 +00:00
2024-06-14 05:19:22 -07:00
2024-08-26 05:18:43 -07:00
2023-09-26 10:35:27 +01:00
2023-12-02 17:18:57 +00:00
2024-05-03 06:12:22 -07:00
2024-03-07 17:25:02 +00:00
2023-06-27 16:23:40 +01:00
2023-03-11 00:08:41 +00:00
2024-07-26 07:43:46 -07:00
2023-09-26 10:35:27 +01:00
2023-04-13 11:56:07 +01:00
2024-08-10 06:34:25 -07:00
2024-08-10 06:34:25 -07:00
2023-12-21 10:38:29 +00:00
2024-03-01 09:28:51 +00:00
2024-09-03 05:39:12 -07:00
2024-03-07 17:25:03 +00:00
2024-05-03 06:12:21 -07:00
2024-02-06 10:32:19 +00:00
2024-03-01 09:28:52 +00:00
2024-03-18 12:21:45 +00:00