Summary: | net-wireless/wpa_supplicant < 0.6.1 driver_wext.c Buffer overflow remote DoS (CVE-2007-6025) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | mobile+disabled, pesa, radhermit |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442387 | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
2007-11-20 21:26:09 UTC
As it seems, our current stable 0.5.7 might not be affected by this bug, but the ~arch ebuilds are. Patch is in $URL and is already committed upstream. Mobile, please advise. (In reply to comment #1) > As it seems, our current stable 0.5.7 might not be affected by this bug, but > the ~arch ebuilds are. > Patch is in $URL and is already committed upstream. > > Mobile, please advise. > *ping* Version 0.6.1, which fixes the bug, has been released. (In reply to comment #3) > Version 0.6.1, which fixes the bug, has been released. > Thanks for the info. mobile herd, please bump so we can close this one. *** Bug 201650 has been marked as a duplicate of this bug. *** *wpa_supplicant-0.6.1 (08 Jan 2008) 08 Jan 2008; Robert Buchholz <rbu@gentoo.org> -wpa_supplicant-0.6.0.ebuild, +wpa_supplicant-0.6.1.ebuild: Version bump by security for remote DoS vulnerability (CVE-2007-6025) in 0.6.0 (bug #199828) |