CVE-2016-10721

Priority
Description
partclone.restore in Partclone 0.2.87 is prone to a heap-based buffer
overflow vulnerability due to insufficient validation of the partclone
image header. An attacker may be able to execute arbitrary code in the
context of the user running the affected application.
Notes
Package
Upstream:released (0.2.88-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected
Ubuntu 20.04 (Focal Fossa):not-affected
More Information

Updated: 2020-04-24 03:24:33 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)