Not sure I can really fix this problem. The issue is that a buffer of
fixed size is being used for snprintf, and the calculations for size
passed to the function are being overrun (IOW, the string being written
to the buffer is longer than the buffer, but it is not overflowing, so
isn't a security bug).

I could increase the size of this buffer, and hopefully fix the
immediate problem, but I don't know if some userspace programs are
expecting a buffer of this length, and need to be patched as well.

Are you seeing any side affects from this?

** Changed in: linux-source-2.6.15 (Ubuntu)
   Importance: Untriaged => Low

-- 
Badness after wpa_supplicant is launched
https://launchpad.net/bugs/50812

--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to