CVE-2011-1776Improper Restriction of Operations within the Bounds of a Memory Buffer in Kernel

Severity
6.1MEDIUMNVD
EPSS
0.1%
top 81.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6
Latest updateMay 13

Description

The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 0.9 | Impact: 5.2

Affected Packages4 packages

Also affects: Enterprise Linux 5.6

Patches

🔴Vulnerability Details

1
GHSA
GHSA-568c-8p2x-qrp5: The is_gpt_valid function in fs/partitions/efi2022-05-13

📋Vendor Advisories

12
Ubuntu
Linux kernel (Natty backport) vulnerabilities2011-11-09
Ubuntu
Linux kernel (i.MX51) vulnerabilities2011-10-25
Ubuntu
Linux kernel (OMAP4) vulnerabilities2011-10-12
Ubuntu
Linux kernel vulnerabilities2011-10-11
Ubuntu
Linux kernel vulnerabilities2011-10-04

💬Community

1
Bugzilla
CVE-2011-1776 kernel: validate size of EFI GUID partition entries2011-05-09
CVE-2011-1776 — Linux Kernel vulnerability | cvebase