Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

service: refine block device implementation #1332

Merged
merged 3 commits into from
Jun 21, 2023

Commits on Jun 21, 2023

  1. service: refine block device implementation

    Refine block device implementation by:
    1) limit number of blocks to u32::MAX
    2) rename BlockDevice::new() to new_with_cache_manager()
    3) introduce another implementation of BlockDevice::new()
    
    Signed-off-by: Jiang Liu <gerry@linux.alibaba.com>
    jiangliu committed Jun 21, 2023
    Configuration menu
    Copy the full SHA
    d6d6e8c View commit details
    Browse the repository at this point in the history
  2. rafs: enhance rafs to support inspecting rafs v6 raw block image

    The rafs core assume meta data is 4k-aligned, so it fails to inspect
    raw block image generated from tarfs images, which are 512-bytes
    aligned.
    
    Signed-off-by: Jiang Liu <gerry@linux.alibaba.com>
    jiangliu committed Jun 21, 2023
    Configuration menu
    Copy the full SHA
    6e1e6c0 View commit details
    Browse the repository at this point in the history
  3. dep: upgrade openssl to 0.10.55 to fix cve warnings

    error[vulnerability]: `openssl` `X509VerifyParamRef::set_host` buffer over-read
        ┌─ /github/workspace/Cargo.lock:122:1
        │
    122 │ openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index
        │ --------------------------------------------------------------------- security vulnerability detected
        │
        = ID: RUSTSEC-2023-0044
        = Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044
        = When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte.
        = Announcement: sfackler/rust-openssl#1965
        = Solution: Upgrade to >=0.10.55
    
    Signed-off-by: Jiang Liu <gerry@linux.alibaba.com>
    jiangliu committed Jun 21, 2023
    Configuration menu
    Copy the full SHA
    6c75349 View commit details
    Browse the repository at this point in the history