vulnerability
Oracle Linux: CVE-2016-5011: ELSA-2016-2605: util-linux security, bug fix, and enhancement update (LOW)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Jul 11, 2016 | Nov 9, 2016 | Dec 3, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jul 11, 2016
Added
Nov 9, 2016
Modified
Dec 3, 2025
Description
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
It was found that util-linux's libblkid library did not properly handle Extended Boot Record (EBR) partitions when reading MS-DOS partition tables. An attacker with physical USB access to a protected machine could insert a storage device with a specially crafted partition table that could, for example, trigger an infinite loop in systemd-udevd, resulting in a denial of service on that machine.
It was found that util-linux's libblkid library did not properly handle Extended Boot Record (EBR) partitions when reading MS-DOS partition tables. An attacker with physical USB access to a protected machine could insert a storage device with a specially crafted partition table that could, for example, trigger an infinite loop in systemd-udevd, resulting in a denial of service on that machine.
Solutions
oracle-linux-upgrade-libblkidoracle-linux-upgrade-libblkid-develoracle-linux-upgrade-libmountoracle-linux-upgrade-libmount-develoracle-linux-upgrade-libuuidoracle-linux-upgrade-libuuid-develoracle-linux-upgrade-util-linuxoracle-linux-upgrade-uuidd
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.