Package name xsupplicant
Date October 27th, 2006
Advisory ID MDKSA-2006:189
Affected versions 2006.0, 2007.0
Synopsis Updated xsupplicant fixes possible remote root stack smash vulnerability

Problem Description

Yannick Van Osselaer discovered a stack overflow in Xsupplicant, which
could potentially be exploited by a remote, authenticated user to gain
root priviledges. Additional code cleanups to fix potential memory
leaks are also included.

Updated packages have been patched to correct this issue.

Updated Packages

Mandriva Linux 2006

 d35f3cee0c66c5778acd39a64e46704a  2006.0/i586/xsupplicant-1.0.1-3.1.20060mdk.i586.rpm
 3df3a3e96b0be68eda96dcffd557a014  2006.0/i586/xsupplicant-doc-1.0.1-3.1.20060mdk.i586.rpm 
 3685820c2527d4608a2fc1722eba6b63  2006.0/SRPMS/xsupplicant-1.0.1-3.1.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 d2e450ac1c2f4dac7968a08a8cb2f2c4  2006.0/x86_64/xsupplicant-1.0.1-3.1.20060mdk.x86_64.rpm
 6027f2b00d4d2c966bcacbdd38a6895b  2006.0/x86_64/xsupplicant-doc-1.0.1-3.1.20060mdk.x86_64.rpm 
 3685820c2527d4608a2fc1722eba6b63  2006.0/SRPMS/xsupplicant-1.0.1-3.1.20060mdk.src.rpm

Mandriva Linux 2007

 b122033612442db1eaf3795e74947a25  2007.0/i586/xsupplicant-1.2.6-1.1mdv2007.0.i586.rpm
 5919e8bb474dea74a5b0e80746d3821c  2007.0/i586/xsupplicant-devel-1.2.6-1.1mdv2007.0.i586.rpm
 2e890e6b58ab87e6104bbd2cbcfac297  2007.0/i586/xsupplicant-doc-1.2.6-1.1mdv2007.0.i586.rpm 
 b126177e58162c5bbeddda641d874423  2007.0/SRPMS/xsupplicant-1.2.6-1.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 46878703a426d4d5770c1572c397f54c  2007.0/x86_64/xsupplicant-1.2.6-1.1mdv2007.0.x86_64.rpm
 bdc5f953605ab0404eb1075e0cb42ac6  2007.0/x86_64/xsupplicant-devel-1.2.6-1.1mdv2007.0.x86_64.rpm
 3023ec5a0ee41f083c6372add22e8444  2007.0/x86_64/xsupplicant-doc-1.2.6-1.1mdv2007.0.x86_64.rpm 
 b126177e58162c5bbeddda641d874423  2007.0/SRPMS/xsupplicant-1.2.6-1.1mdv2007.0.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5602

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.