Jamie Strandboge
2010-Dec-21 14:26 UTC
[Secure-testing-team] Bug#607732: opensc: buffer overflow with rogue cards
Package: opensc Version: 0.11.13-1 Severity: grave Tags: patch security Justification: user security hole User: ubuntu-devel at lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: specially crafted cards may be able to execute code. - debian/patches/min-max.patch: Add MIN and MAX macros for last patch - debian/patches/buffer-overflow.patch: Fix potential buffer overflow by rogue cards. (LP: #692483) This is upstream changesets: https://www.opensc-project.org/opensc/changeset/4912 https://www.opensc-project.org/opensc/changeset/4913 This was originally submitted as an Ubuntu bug in: https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483 This does not currently have a CVE assigned. Thanks for considering the patch. -- System Information: Debian Release: squeeze/sid APT prefers natty-updates APT policy: (500, ''natty-updates''), (500, ''natty-security''), (500, ''natty'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.37-10-generic (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -------------- next part -------------- A non-text attachment was scrubbed... Name: tmpySEOUY Type: text/x-diff Size: 4827 bytes Desc: not available URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20101221/daec88e9/attachment.diff>