Out-of-Bounds The advisory has been revoked - it doesn't affect any version of package partclone  (opens in a new tab)


Threat Intelligence

EPSS
0.84% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1804-PARTCLONE-666973
  • published2 May 2018
  • disclosed2 May 2018

Introduced: 2 May 2018

CVE-2016-10722  (opens in a new tab)
CWE-119  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:18.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream partclone package and not the partclone package as distributed by Ubuntu.

partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.