[CLSA-2023:1673905718] Fix CVE(s): CVE-2016-5011
Type:
security
Severity:
Moderate
Release date:
2023-01-16 21:48:38 UTC
Description:
* SECURITY UPDATE: Extended partition loop in MBR partition table leads to DoS - debian/patches/CVE-2016-5011-1.patch: ignore MBR extended partition at zero offset - debian/patches/CVE-2016-5011-2.patch: avoid non-empty recursion in EBR - CVE-2016-5011
Updated packages:
  • bsdutils_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:a8f36a25f06da35187b7f7a8d8dc0e9ef620a7a7
  • libblkid-dev_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:844b97113c8ef2f182a953d183b457d0a3609e4e
  • libblkid1_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:0cdc97eb047d87ffa77710ac0da0f78d8f352696
  • libfdisk-dev_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:3d2b2aa2facbc863a36aeaacf3476b4478277543
  • libfdisk1_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:9723fd44c88181cb5621ad8a3e5a77dc4955f1e7
  • libmount-dev_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:90e0fdc7a8dc532cdb419da68af33ce706b9229d
  • libmount1_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:269b87a3ecfb7b4fb02356d41bfbef0dac408a3d
  • libsmartcols-dev_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:61a1109eb0a9d46d3a5a905318c7f0922156bbea
  • libsmartcols1_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:6e09cde8447e15274784c0d297707f18477c8192
  • libuuid1_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:c0de44352bfc2a7d3a0a558d2d2c3cff870f2f57
  • mount_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:ca55d55d032183104e41be661923cbee06de3adb
  • util-linux_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:f63a25fca5fd4723f7808f84f3761672bb088013
  • util-linux-locales_2.27.1-6ubuntu3.10+tuxcare.els1_all.deb
    sha:0839ee8ecc4259c7a3c6aa0cf746cec8eb3d7a0e
  • uuid-dev_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:1cd10be3ddcab167808b07b57def517a17de1b7f
  • uuid-runtime_2.27.1-6ubuntu3.10+tuxcare.els1_amd64.deb
    sha:28f6e0de2e0cd449d9a5fd08f5078f173fcf12d1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.