|
Message-ID: <1297727697.2930.17.camel@localhost> Date: Mon, 14 Feb 2011 18:54:57 -0500 From: Marc Deslauriers <marc.deslauriers@...onical.com> To: oss-security@...ts.openwall.com Subject: CVE request: aircrack-ng Hello, I can't seem to locate a CVE for this issue: "Remote buffer overflow in aircrack-ng causes DOS and possible code execution" http://seclists.org/bugtraq/2010/Mar/236 http://pyrit.wordpress.com/2010/03/28/remote-exploit-against-aircrack-ng/ version 1.1 was released with the following fix: http://trac.aircrack-ng.org/changeset/1676 This bug was then opened stating the fix was incomplete: http://trac.aircrack-ng.org/ticket/728 https://bugzilla.redhat.com/show_bug.cgi?id=577654 And then the following commits were done post-1.1: http://trac.aircrack-ng.org/changeset/1683 http://trac.aircrack-ng.org/changeset/1687 http://trac.aircrack-ng.org/changeset/1699 http://trac.aircrack-ng.org/changeset/1701 http://trac.aircrack-ng.org/changeset/1702 Thanks, Marc.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.