{"id":"CVE-2016-5011","details":"The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.","modified":"2026-04-16T01:44:01.413867596Z","published":"2017-04-11T15:59:00.183Z","related":["SUSE-SU-2016:2764-1","SUSE-SU-2016:2954-1","SUSE-SU-2017:0553-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:11282-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.8.6.0"}]},{"cpe":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"2.1"}]},{"cpe":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.1"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.3"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.5"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.7"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.3"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.7"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.3"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.7"}]}]},"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2605.html"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91683"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036272"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/07/11/2"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/util-linux/util-linux","events":[{"introduced":"0"},{"last_affected":"44338f7fe6a529cef1f206dccd95e7282625c483"},{"last_affected":"e6a72859700384a7e0565472ecf5c48a6392be0e"}],"database_specific":{"source":"CPE_FIELD","cpe":["cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"2.28"},{"last_affected":"7.0"}]}}],"versions":["7-start","7.0-start","v2.10f","v2.10m","v2.10s","v2.11b","v2.11f","v2.11m","v2.11n","v2.11o","v2.11q","v2.11r","v2.11t","v2.11u","v2.11v","v2.11w","v2.11x","v2.11y","v2.12","v2.12a","v2.12b","v2.12d","v2.12h","v2.12i","v2.12j","v2.12k","v2.12l","v2.12m","v2.12o","v2.12p","v2.12pre","v2.12q","v2.12q-pre1","v2.12q-pre2","v2.12r","v2.12r-pre1","v2.13","v2.13-pre1","v2.13-pre2","v2.13-pre3","v2.13-pre4","v2.13-pre5","v2.13-pre6","v2.13-pre7","v2.13-rc1","v2.13-rc2","v2.13-rc3","v2.14","v2.14-rc1","v2.14-rc2","v2.14-rc3","v2.15","v2.15-rc1","v2.15-rc2","v2.16","v2.16-rc1","v2.16-rc2","v2.17","v2.17-rc1","v2.17-rc2","v2.17-rc3","v2.18","v2.18-rc1","v2.18-rc2","v2.19","v2.19-rc1","v2.19-rc2","v2.19-rc3","v2.2","v2.20","v2.20-rc1","v2.20-rc2","v2.21","v2.21-rc1","v2.21-rc2","v2.22","v2.22-rc1","v2.22-rc2","v2.23","v2.23-rc1","v2.23-rc2","v2.23.1","v2.23.2","v2.24","v2.24-rc1","v2.24-rc2","v2.25","v2.25-rc1","v2.25-rc2","v2.26","v2.26-rc1","v2.26-rc2","v2.27","v2.27-rc1","v2.27-rc2","v2.28","v2.28-rc1","v2.28-rc2","v2.5","v2.7.1","v2.8","v2.9i","v2.9v"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5011.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}