This bug was fixed in the package opensc - 0.11.12-1ubuntu3.2 --------------- opensc (0.11.12-1ubuntu3.2) lucid-security; urgency=low
* SECURITY UPDATE: specially crafted cards may be able to execute code. - debian/patches/min-max.patch: Add MIN and MAX macros for last patch - debian/patches/buffer-overflow.patch: Fix potential buffer overflow by rogue cards. (LP: #692483) -- Torsten Spindler (Canonical) <tors...@canonical.com> Mon, 20 Dec 2010 11:00:40 +0100 ** Changed in: opensc (Ubuntu Karmic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Registry Administrators, which is the registrant for Debian. https://bugs.launchpad.net/bugs/692483 Title: Buffer overflow _______________________________________________ Mailing list: https://launchpad.net/~registry Post to : registry@lists.launchpad.net Unsubscribe : https://launchpad.net/~registry More help : https://help.launchpad.net/ListHelp