Hash: SHA256

Package        : partclone
Version        : 0.2.48-1+deb7u1
CVE ID         : CVE-2017-6596
Debian Bug     : 857966 

It was discovered that partclone, an utility to backup partitions,
was prone to a heap-based buffer overflow vulnerability due to
insufficient validation of the partclone image header. This could allow
remote attackers to cause a 'Denial of Service attack' in the context
of the user running the affected application via a crafted partition
image.

For Debian 7 "Wheezy", these problems have been fixed in version
0.2.48-1+deb7u1.

We recommend that you upgrade your partclone packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-923-1: partclone security update

April 28, 2017
It was discovered that partclone, an utility to backup partitions, was prone to a heap-based buffer overflow vulnerability due to insufficient validation of the partclone image hea...

Summary

For Debian 7 "Wheezy", these problems have been fixed in version
0.2.48-1+deb7u1.

We recommend that you upgrade your partclone packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : partclone
Version : 0.2.48-1+deb7u1
CVE ID : CVE-2017-6596
Debian Bug : 857966

Related News