]> code.ossystems Code Review - openembedded-core.git/commit
blktrace: Security fix CVE-2018-10689
authorYi Zhao <yi.zhao@windriver.com>
Fri, 24 Aug 2018 07:21:27 +0000 (15:21 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 28 Aug 2018 09:27:15 +0000 (10:27 +0100)
commit6a7ed8b1db10abd38bdd20c77a8f27427d381156
tree5af9adaa371ef74bb52f3a05558049d8779eead6
parentd4eaf42f7708f8d3a31a04d958bd7420dd7dd6b9
blktrace: Security fix CVE-2018-10689

CVE-2018-10689: blktrace (aka Block IO Tracing) 1.2.0, as used with the
Linux kernel and Android, has a buffer overflow in the dev_map_read
function in btt/devmap.c because the device and devno arrays are too
small, as demonstrated by an invalid free when using the btt program
with a crafted file.

References:
https://nvd.nist.gov/vuln/detail/CVE-2018-10689

Patch from:
https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-kernel/blktrace/blktrace/CVE-2018-10689.patch [new file with mode: 0644]
meta/recipes-kernel/blktrace/blktrace_git.bb