This bug was fixed in the package blktrace - 1.2.0-5ubuntu4
---------------
blktrace (1.2.0-5ubuntu4) oracular; urgency=medium
* Fix out-of-bounds access in the check_cpu_map function of blkparse
when reading from stdin. (LP: #2073170)
- debian/patches/13_blkparse_check-cpu-map_skip_on_pipe.patch:
blkparse: skip check_cpu_map with pipe input. Thanks to Jeff
Mahoney <[email protected]>.
- debian/patches/14_blkparse_fix_check-cpu-map_memset_size.patch:
blkparse: fix incorrectly sized memset in check_cpu_map. Thanks
to Jeff Mahoney <[email protected]>.
-- Jacob Martin <[email protected]> Mon, 22 Jul 2024 12:29:40
-0500
** Changed in: blktrace (Ubuntu Oracular)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073170
Title:
blkparse: out-of-bounds access in function check_cpu_map while reading
trace from stdin
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/blktrace/+bug/2073170/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs