This bug was fixed in the package blktrace - 1.2.0-5ubuntu4

---------------
blktrace (1.2.0-5ubuntu4) oracular; urgency=medium

  * Fix out-of-bounds access in the check_cpu_map function of blkparse
    when reading from stdin. (LP: #2073170)
    - debian/patches/13_blkparse_check-cpu-map_skip_on_pipe.patch:
      blkparse: skip check_cpu_map with pipe input. Thanks to Jeff
      Mahoney <[email protected]>.
    - debian/patches/14_blkparse_fix_check-cpu-map_memset_size.patch:
      blkparse: fix incorrectly sized memset in check_cpu_map. Thanks
      to Jeff Mahoney <[email protected]>.

 -- Jacob Martin <[email protected]>  Mon, 22 Jul 2024 12:29:40
-0500

** Changed in: blktrace (Ubuntu Oracular)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073170

Title:
  blkparse: out-of-bounds access in function check_cpu_map while reading
  trace from stdin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/blktrace/+bug/2073170/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to