Upstream has issued advisories today (November 10): http://openwall.com/lists/oss-security/2015/11/10/9 http://openwall.com/lists/oss-security/2015/11/10/10 http://openwall.com/lists/oss-security/2015/11/10/11 The packages are only vulnerable if the CONFIG_WNM or CONFIG_WPA_PWD options are set in the configuration, which they are not in our packages, so this bug is INVALID. I'm just filing this so we know it's already been looked into. Also, we should still update to 2.6 in Cauldron. Reproducible: Steps to Reproduce:
Closing as our configurations are not affected. Please update Cauldron to 2.6.
Status: NEW => RESOLVEDResolution: (none) => INVALID
URL: (none) => http://lwn.net/Vulnerabilities/664041/