This bug was fixed in the package opensc - 0.11.13-1ubuntu2.1
---------------
opensc (0.11.13-1ubuntu2.1) maverick-security; urgency=low
* SECURITY UPDATE: specially crafted cards may be able to execute code.
- debian/patches/min-max.patch: Add MIN and MAX macros for last patch
- debian/patches/buffer-overflow.patch: Fix potential buffer overflow
by rogue cards. (LP: #692483)
-- Torsten Spindler (Canonical) <[email protected]> Mon, 20 Dec 2010
13:51:01 +0100
** Changed in: opensc (Ubuntu Maverick)
Status: Fix Committed => Fix Released
** Changed in: opensc (Ubuntu Lucid)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Registry
Administrators, which is the registrant for Debian.
https://bugs.launchpad.net/bugs/692483
Title:
Buffer overflow
_______________________________________________
Mailing list: https://launchpad.net/~registry
Post to : [email protected]
Unsubscribe : https://launchpad.net/~registry
More help : https://help.launchpad.net/ListHelp