This bug was fixed in the package opensc - 0.11.4-2ubuntu2.1 --------------- opensc (0.11.4-2ubuntu2.1) hardy-security; urgency=low
* SECURITY UPDATE: specially crafted cards may be able to execute code. - Move MIN and MAX macros from muscle.c to internal.h - https://www.opensc-project.org/opensc/changeset/4912 - Fix potential buffer overflow by rogue cards. (LP: #692483) - update card-acos5.c, card-atrust-acos.c and card-starcos.c to use MIN macros to protect against buffer overflow - https://www.opensc-project.org/opensc/changeset/4913 -- Torsten Spindler (Canonical) <tors...@canonical.com> Tue, 21 Dec 2010 16:34:32 +0100 -- You received this bug notification because you are a member of Registry Administrators, which is the registrant for Debian. https://bugs.launchpad.net/bugs/692483 Title: Buffer overflow _______________________________________________ Mailing list: https://launchpad.net/~registry Post to : registry@lists.launchpad.net Unsubscribe : https://launchpad.net/~registry More help : https://help.launchpad.net/ListHelp