#VU45092 Heap-based buffer overflow in Linux kernel - CVE-2011-1577
Published: May 3, 2011 / Updated: August 11, 2020
Linux kernel
Linux Foundation
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier. A remote attacker can use a crafted size of the EFI GUID partition-table header on removable media. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://downloads.avaya.com/css/P8/documents/100145416
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html
- http://openwall.com/lists/oss-security/2011/04/12/17
- http://openwall.com/lists/oss-security/2011/04/13/1
- http://rhn.redhat.com/errata/RHSA-2011-0833.html
- http://securityreason.com/securityalert/8238
- http://securitytracker.com/id?1025355
- http://www.securityfocus.com/archive/1/517477/100/0/threaded
- http://www.securityfocus.com/bid/47343
- http://www.spinics.net/lists/mm-commits/msg83274.html
- https://bugzilla.redhat.com/show_bug.cgi?id=695976
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66773