Buffer overflow
Bug #692483 reported by
Torsten Spindler
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
opensc (Debian) |
Fix Released
|
Unknown
|
|||
opensc (Ubuntu) |
Fix Released
|
Low
|
Unassigned | ||
Hardy |
Fix Released
|
Low
|
Unassigned | ||
Karmic |
Fix Released
|
Low
|
Unassigned | ||
Lucid |
Fix Released
|
Low
|
Unassigned | ||
Maverick |
Fix Released
|
Low
|
Unassigned | ||
Natty |
Fix Released
|
Low
|
Unassigned |
Bug Description
Binary package hint: opensc
A potential security problem exists at least in Ubuntu 10.04 LTS and was fixed upstream in https:/
Testing: the package was tested on Lucid, no regression was obvious.
description: | updated |
tags: | added: patch |
security vulnerability: | no → yes |
Changed in opensc (Ubuntu Lucid): | |
status: | New → Confirmed |
importance: | Undecided → Low |
Changed in opensc (Ubuntu Maverick): | |
status: | New → Confirmed |
importance: | Undecided → Low |
Changed in opensc (Ubuntu Natty): | |
status: | New → Confirmed |
importance: | Undecided → Low |
Changed in opensc (Ubuntu Hardy): | |
status: | New → Confirmed |
importance: | Undecided → Low |
Changed in opensc (Ubuntu Karmic): | |
status: | New → Confirmed |
importance: | Undecided → Low |
Changed in opensc (Debian): | |
status: | Unknown → Fix Released |
To post a comment you must log in.
The problem seems to be also in the git repo from upstream Debian, git://git. debian. org/git/ pkg-opensc/ opensc. git . The attached patches are taken from opensc upstream (https:/ /www.opensc- project. org/opensc/ changeset/ 4912 and https:/ /www.opensc- project. org/opensc/ changeset/ 4913).