summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/python/python3-wcwidth
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2024-08-21 09:01:03 +0000
committerSteve Sakoman <steve@sakoman.com>2024-09-03 05:39:12 -0700
commit8c533e92423a77efe3b5d1419ec69723d7e23146 (patch)
tree853bddcc5cfbaecfcbfb45a71eddcdca7f5758d6 /meta/recipes-devtools/python/python3-wcwidth
parentc5627ab06fc07221237b9a7059ac378ea80578f8 (diff)
downloadpoky-8c533e92423a77efe3b5d1419ec69723d7e23146.tar.gz
qemu: fix CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-4467 Upstream Patches: https://gitlab.com/qemu-project/qemu/-/commit/bd385a5298d7062668e804d73944d52aec9549f1 https://gitlab.com/qemu-project/qemu/-/commit/2eb42a728d27a43fdcad5f37d3f65706ce6deba5 https://gitlab.com/qemu-project/qemu/-/commit/7e1110664ecbc4826f3c978ccb06b6c1bce823e6 https://gitlab.com/qemu-project/qemu/-/commit/6bc30f19498547fac9cef98316a65cf6c1f14205 https://gitlab.com/qemu-project/qemu/-/commit/7ead946998610657d38d1a505d5f25300d4ca613 (From OE-Core rev: 0e309919b8807950cebc8924fc1e15763548b1f1) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/python/python3-wcwidth')
0 files changed, 0 insertions, 0 deletions