Linux Kernel EFI GUID Partition Table Buffer Overflow Lets Local Users Deny Service
SecurityTracker Alert ID: 1025355|
SecurityTracker URL: http://securitytracker.com/id/1025355
(Links to External Site)
Date: Apr 14 2011
Denial of service via local system|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2.4.x, 2.6.x|
A vulnerability was reported in Linux Kernel. A local user can cause denial of service conditions.|
A local user can create a device with a specially crafted EFI GUID partition table to trigger a buffer overflow and cause a kernel oops when the device is connected to the target system.
The vulnerability resides in 'fs/partitions/efi.c'.
Timo Warns (PRESENSE Technologies GmbH) reported this vulnerability.
A local user can cause the target system to crash.|
The vendor has issued a source code fix.|
Vendor URL: www.kernel.org/ (Links to External Site)
Source Message Contents
Subject: [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel|
PRE-CERT Security Advisory
* Advisory: PRE-SA-2011-03
* Released on: 13 Apr 2011
* Last updated on: 13 Apr 2011
* Affected product: Linux Kernel 2.4 and 2.6
* Impact: denial-of-service
* Origin: storage devices
* Credit: Timo Warns (PRESENSE Technologies GmbH)
* CVE Identifier: CVE-2011-1577
The Linux kernel contains a vulnerability that may lead to
a denial-of-service due to corrupted partition tables on storage
The kernel automatically evaluates partition tables of storage devices.
This happens independently of whether any auto-mounting is enabled or
not. The code for evaluating EFI GUID partition tables contains a buffer
overflow bug that allows to cause kernel oops resulting in a denial of
Compile and use a kernel that does not evaluate EFI GUID partition
tables. The corresponding configuration key is CONFIG_EFI_PARTITION.
A patch is available at
When further information becomes available, this advisory will be
updated. The most recent version of this advisory is available at:
PRE-CERT can be reached under firstname.lastname@example.org. For PGP key
information, refer to http://www.pre-cert.de/.