CVE-2016-10722

Priority
Description
partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer
overflow vulnerability due to insufficient validation of the FAT
superblock, related to the mark_reserved_sectors function. An attacker may
be able to execute arbitrary code in the context of the user running the
affected application.
Notes
Package
Upstream:released (0.2.88-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected
Ubuntu 20.04 (Focal Fossa):not-affected
More Information

Updated: 2020-04-24 03:24:44 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)