summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/qemu.inc
diff options
context:
space:
mode:
authorVijay Anusuri <vanusuri@mvista.com>2024-09-06 14:56:27 +0530
committerSteve Sakoman <steve@sakoman.com>2024-09-16 06:09:56 -0700
commitd0429def9e227ef70e97739c33387c88a70b2bde (patch)
treed3b912a98d4880e8ecf7d271c5644f66c57d14b7 /meta/recipes-devtools/qemu/qemu.inc
parentbfbf6d481d4d9d21fd624528c8a61ccc64fadc4c (diff)
downloadpoky-d0429def9e227ef70e97739c33387c88a70b2bde.tar.gz
qemu: Backport fix for CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-4467 Upstream commits: https://gitlab.com/qemu-project/qemu/-/commit/bd385a5298d7062668e804d73944d52aec9549f1 https://gitlab.com/qemu-project/qemu/-/commit/2eb42a728d27a43fdcad5f37d3f65706ce6deba5 https://gitlab.com/qemu-project/qemu/-/commit/7e1110664ecbc4826f3c978ccb06b6c1bce823e6 https://gitlab.com/qemu-project/qemu/-/commit/83930780325b144a5908c45b3957b9b6457b3831 https://gitlab.com/qemu-project/qemu/-/commit/7ead946998610657d38d1a505d5f25300d4ca613 (From OE-Core rev: c23ad8c89c3dd5b6004677cd0b534e22a293134d) Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu.inc')
-rw-r--r--meta/recipes-devtools/qemu/qemu.inc5
1 files changed, 5 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc
index 4684e44524..6ff3c2f9bc 100644
--- a/meta/recipes-devtools/qemu/qemu.inc
+++ b/meta/recipes-devtools/qemu/qemu.inc
@@ -113,6 +113,11 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \
113 file://CVE-2024-7409-0002.patch \ 113 file://CVE-2024-7409-0002.patch \
114 file://CVE-2024-7409-0003.patch \ 114 file://CVE-2024-7409-0003.patch \
115 file://CVE-2024-7409-0004.patch \ 115 file://CVE-2024-7409-0004.patch \
116 file://CVE-2024-4467-0001.patch \
117 file://CVE-2024-4467-0002.patch \
118 file://CVE-2024-4467-0003.patch \
119 file://CVE-2024-4467-0004.patch \
120 file://CVE-2024-4467-0005.patch \
116 " 121 "
117UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" 122UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar"
118 123