summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2018-08-24 15:21:27 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-09-27 12:17:45 +0100
commit9afe31b30c55845031fba451938272d992bdf809 (patch)
tree677361e2a0591278760c6a5fe9dedc059e507a61 /meta/recipes-core
parent28c68772cb0f675943c35044e0d1f4ea4a190c59 (diff)
downloadpoky-9afe31b30c55845031fba451938272d992bdf809.tar.gz
blktrace: Security fix CVE-2018-10689
CVE-2018-10689: blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file. References: https://nvd.nist.gov/vuln/detail/CVE-2018-10689 Patch from: https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 (From OE-Core rev: 6a7ed8b1db10abd38bdd20c77a8f27427d381156) (From OE-Core rev: 54b26752149d945955569f163bf9dd1595970d35) Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core')
0 files changed, 0 insertions, 0 deletions