Not sure I can really fix this problem. The issue is that a buffer of fixed size is being used for snprintf, and the calculations for size passed to the function are being overrun (IOW, the string being written to the buffer is longer than the buffer, but it is not overflowing, so isn't a security bug).
I could increase the size of this buffer, and hopefully fix the immediate problem, but I don't know if some userspace programs are expecting a buffer of this length, and need to be patched as well. Are you seeing any side affects from this? ** Changed in: linux-source-2.6.15 (Ubuntu) Importance: Untriaged => Low -- Badness after wpa_supplicant is launched https://launchpad.net/bugs/50812 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs