Dan Smith, Julia Kreger and Jay Faulkner discovered that in
image processing for Ironic, a specially crafted image
could be used by an authenticated user to exploit undesired behaviors
in qemu-img, including possible unauthorized access to potentially
sensitive data.
More Stories
valkey-8.0.1-1.fc40
FEDORA-2024-8a9a692906 Packages in this update: valkey-8.0.1-1.fc40 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc41
FEDORA-2024-e717420659 Packages in this update: valkey-8.0.1-1.fc41 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.el9
FEDORA-EPEL-2024-845b92ee3f Packages in this update: valkey-8.0.1-1.el9 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc39
FEDORA-2024-83e96146cf Packages in this update: valkey-8.0.1-1.fc39 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
pdns-recursor-5.1.2-1.fc41
FEDORA-2024-aebaa73b1f Packages in this update: pdns-recursor-5.1.2-1.fc41 Update description: Update to latest upstream Read More
pdns-recursor-5.0.9-1.fc40
FEDORA-2024-af0bf62ac6 Packages in this update: pdns-recursor-5.0.9-1.fc40 Update description: Update to latest upstream Read More