This bug was fixed in the package opensc - 0.11.12-1ubuntu3.2

---------------
opensc (0.11.12-1ubuntu3.2) lucid-security; urgency=low

  * SECURITY UPDATE: specially crafted cards may be able to execute code.
    - debian/patches/min-max.patch: Add MIN and MAX macros for last patch
    - debian/patches/buffer-overflow.patch: Fix potential buffer overflow
      by rogue cards. (LP: #692483)
 -- Torsten Spindler (Canonical) <tors...@canonical.com>   Mon, 20 Dec 2010 
11:00:40 +0100

** Changed in: opensc (Ubuntu Karmic)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Registry
Administrators, which is the registrant for Debian.
https://bugs.launchpad.net/bugs/692483

Title:
  Buffer overflow

_______________________________________________
Mailing list: https://launchpad.net/~registry
Post to     : registry@lists.launchpad.net
Unsubscribe : https://launchpad.net/~registry
More help   : https://help.launchpad.net/ListHelp

Reply via email to