Summary: | <sys-apps/gptfdisk-1.0.6: Out of bounds write in ReadLogicalParts (CVE-2021-0308) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [glsa+ cve] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
![]() ![]() ![]() ![]() I'm not sure how exploitable this is without control over a disk in the first place. So, I'll call it B1 for now, but I think we need to discuss this. @ maintainer(s): Could you please bump to v1.0.6.1 first (https://sourceforge.net/p/gptfdisk/code/ci/f063fe08e424c99f133df18bf9dce49c851bcb0a/) before stabilize? ppc64 done arm done sparc stable ppc done amd64 done arm64 done x86 done all arches done Please cleanup New GLSA request filed. This issue was resolved and addressed in GLSA 202105-03 at https://security.gentoo.org/glsa/202105-03 by GLSA coordinator Thomas Deutschmann (whissi). |