]> code.ossystems Code Review - openembedded-core.git/commit
blktrace: Security fix CVE-2018-10689
authorYi Zhao <yi.zhao@windriver.com>
Fri, 24 Aug 2018 07:21:27 +0000 (15:21 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 27 Sep 2018 11:16:45 +0000 (12:16 +0100)
commit54b26752149d945955569f163bf9dd1595970d35
tree215be787752885dfba09d4d8433b286d8f1b4ab7
parenta925096c62b2034c824bfdf68631e037809b6a30
blktrace: Security fix CVE-2018-10689

CVE-2018-10689: blktrace (aka Block IO Tracing) 1.2.0, as used with the
Linux kernel and Android, has a buffer overflow in the dev_map_read
function in btt/devmap.c because the device and devno arrays are too
small, as demonstrated by an invalid free when using the btt program
with a crafted file.

References:
https://nvd.nist.gov/vuln/detail/CVE-2018-10689

Patch from:
https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7

(From OE-Core rev: 6a7ed8b1db10abd38bdd20c77a8f27427d381156)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-kernel/blktrace/blktrace/CVE-2018-10689.patch [new file with mode: 0644]
meta/recipes-kernel/blktrace/blktrace_git.bb