Darcsweb-Url: 
http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061209194714-dd049-ebcda03d26cfd200beec4bc29f1dbecf3a76444b.gz;

[FSA73-madwifi-ng
voroskoi <[EMAIL PROTECTED]>**20061209194714] {
hunk ./frugalware/xml/security.xml 29
+       <fsa>
+               <id>73</id>
+               <date>2006-12-09</date>
+               <author>voroskoi</author>
+               <package>madwifi-ng</package>
+               <vulnerable>r1491_20060404-9</vulnerable>
+               <unaffected>0.9.2.1-1</unaffected>
+               <bts>http://bugs.frugalware.org/task/1513</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332</cve>
+               <desc>Laurent Butti, Jerome Raznieski, and Julien Tinnes have 
reported a vulnerability in MadWifi, which can be exploited by malicious people 
to compromise a vulnerable system.
+                       The vulnerability is caused due to a boundary error and 
can be exploited to cause a buffer overflow, which allows execution of 
arbitrary code with kernel privileges.</desc>
+       </fsa>
}
_______________________________________________
Frugalware-darcs mailing list
Frugalware-darcs@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-darcs

Reply via email to