http://bugzilla.opensuse.org/show_bug.cgi?id=1091776 Bug ID: 1091776 Summary: VUL-0: CVE-2016-10722: partclone: Heap-based bufferoverflow vulnerability due to insufficient validation of the FAT superblock,related to the mark_reserved_sectors function. Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/205199/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: jsegitz@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2016-10722 partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10722 https://github.com/Thomas-Tsai/partclone/issues/71 https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-ov... -- You are receiving this mail because: You are on the CC list for the bug.