Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202105-03 ] GPT fdisk: Integer underflow
Date: Wed, 26 May 2021 08:07:32
Message-Id: f2e41cb9-1bf8-73d1-ac2a-ace577c1371a@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202105-03
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GPT fdisk: Integer underflow
9 Date: May 26, 2021
10 Bugs: #768762
11 ID: 202105-03
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 An integer underflow in sgdisk from GPT fdisk package might allow local
19 attacker(s) to escalate privileges.
20
21 Background
22 ==========
23
24 GPT fdisk (consisting of the gdisk, cgdisk, sgdisk, and fixparts
25 programs) is a set of text-mode partitioning tools for Linux, FreeBSD,
26 Mac OS X, and Windows.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 sys-apps/gptfdisk < 1.0.6 >= 1.0.6
35
36 Description
37 ===========
38
39 It was discovered that ReadLogicalParts() function in basicmbr.cc was
40 missing a bounds check.
41
42 Impact
43 ======
44
45 A local attacker could entice a user to insert a malicious formatted
46 block device (USB stick or SD card for example), that, when processed
47 with sgdisk, possibly resulting in local escalation of privileges or a
48 Denial of Service condition.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All GPT fdisk users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=sys-apps/gptfdisk-1.0.6"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2021-0308
67 https://nvd.nist.gov/vuln/detail/CVE-2021-0308
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 https://security.gentoo.org/glsa/202105-03
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users' machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 https://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2021 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
OpenPGP_signature.asc application/pgp-signature