Linux Archive

Linux Archive (http://www.linux-archive.org/)
-   Ubuntu Kernel Team (http://www.linux-archive.org/ubuntu-kernel-team/)
-   -   fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (http://www.linux-archive.org/ubuntu-kernel-team/537870-fs-partitions-efi-c-corrupted-guid-partition-tables-can-cause-kernel-oops.html)

Stefan Bader 06-10-2011 11:18 AM

fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops
 
On 10.06.2011 12:05, Andy Whitcroft wrote:
> CVE-2011-1577
>
> Heap-based buffer overflow in the is_gpt_valid function in
> fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows
> physically proximate attackers to cause a denial of service (OOPS)
> or possibly have unspecified other impact via a crafted size of
> the EFI GUID partition-table header on removable media.
>
> This vunerability is fixed by the upstream commit below:
>
> commit 3eb8e74ec72736b9b9d728bad30484ec89c91dde
> Author: Timo Warns <Warns@pre-sense.de>
> Date: Thu May 26 16:25:57 2011 -0700
>
> fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops
>
> Following this email are patches for Hardy; Lucid and Lucid/fsl-imx51;
> and Maverick, Maverick/ti-omap4, Natty and Natty/ti-omap4. Those for
> Maverick and Natty are clean cherry-picks from mainline, the remainder
> are backports.
>
> Proposing for Hardy, Lucid, Lucid/fsl-imx51, Maverick, Maveric/ti-omap4, Natty,
> and Natty/ti-omap4.
>
> Also needed for Lucid/ec2, Lucid/mvl-dove, and Maverick/mvl-dove which
> will get it from their parent branch.
>
> -apw
>
So for Hardy there is only hardsect_size... Otherwise the code section looks
like upstream. Sounds like a valid approximation.

Acked-by: Stefan Bader <stefan.bader@canonical.com>

--
kernel-team mailing list
kernel-team@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kernel-team

Seth Forshee 06-10-2011 01:33 PM

fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops
 
On Fri, Jun 10, 2011 at 01:18:56PM +0200, Stefan Bader wrote:
> On 10.06.2011 12:05, Andy Whitcroft wrote:
> > CVE-2011-1577
> >
> > Heap-based buffer overflow in the is_gpt_valid function in
> > fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows
> > physically proximate attackers to cause a denial of service (OOPS)
> > or possibly have unspecified other impact via a crafted size of
> > the EFI GUID partition-table header on removable media.
> >
> > This vunerability is fixed by the upstream commit below:
> >
> > commit 3eb8e74ec72736b9b9d728bad30484ec89c91dde
> > Author: Timo Warns <Warns@pre-sense.de>
> > Date: Thu May 26 16:25:57 2011 -0700
> >
> > fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops
> >
> > Following this email are patches for Hardy; Lucid and Lucid/fsl-imx51;
> > and Maverick, Maverick/ti-omap4, Natty and Natty/ti-omap4. Those for
> > Maverick and Natty are clean cherry-picks from mainline, the remainder
> > are backports.
> >
> > Proposing for Hardy, Lucid, Lucid/fsl-imx51, Maverick, Maveric/ti-omap4, Natty,
> > and Natty/ti-omap4.
> >
> > Also needed for Lucid/ec2, Lucid/mvl-dove, and Maverick/mvl-dove which
> > will get it from their parent branch.
> >
> > -apw
> >
> So for Hardy there is only hardsect_size... Otherwise the code section looks
> like upstream. Sounds like a valid approximation.

Agreed, bdev_hardsect_size() appears to convey the same information.

> Acked-by: Stefan Bader <stefan.bader@canonical.com>

Acked-by: Seth Forshee <seth.forshee@canonical.com>

--
kernel-team mailing list
kernel-team@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kernel-team


All times are GMT. The time now is 09:25 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.