[CVE-2011-1577] fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops

Andy Whitcroft apw at canonical.com
Fri Jun 10 10:05:56 UTC 2011


CVE-2011-1577

    Heap-based buffer overflow in the is_gpt_valid function in
    fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows
    physically proximate attackers to cause a denial of service (OOPS)
    or possibly have unspecified other impact via a crafted size of
    the EFI GUID partition-table header on removable media.

This vunerability is fixed by the upstream commit below:

  commit 3eb8e74ec72736b9b9d728bad30484ec89c91dde
  Author: Timo Warns <Warns at pre-sense.de>
  Date:   Thu May 26 16:25:57 2011 -0700

    fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops

Following this email are patches for Hardy; Lucid and Lucid/fsl-imx51;
and Maverick, Maverick/ti-omap4, Natty and Natty/ti-omap4.  Those for
Maverick and Natty are clean cherry-picks from mainline, the remainder
are backports.

Proposing for Hardy, Lucid, Lucid/fsl-imx51, Maverick, Maveric/ti-omap4, Natty,
and Natty/ti-omap4.

Also needed for Lucid/ec2, Lucid/mvl-dove, and Maverick/mvl-dove which
will get it from their parent branch.

-apw




More information about the kernel-team mailing list