lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 10 Jan 2008 22:44:54 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:007 ] - Updated madwifi-source,
 wpa_supplicant packages fix vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:007
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : madwifi-source
 Date    : January 10, 2008
 Affected: 2007.0, 2007.1, 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 MadWifi prior to 0.9.3.3 allowed remote attackers to cause a denial
 of service (panic) via a beacon frame with a large length value in
 the extended supported rates (xrates) element, which would trigger
 an assertion error.
 
 Updated packages have been updated to 0.9.3.3 to correct this
 issue. Wpa_supplicant is built using madwifi-source and has been
 rebuilt using 0.9.3.3 source.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 994e5a529757654404fe20c659f01a81  2007.0/i586/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
 96337298e1b19ebf0680b704bb37aabc  2007.0/i586/wpa_gui-0.5.5-2.3mdv2007.0.i586.rpm
 b71e1f08dcecac80668c1e6486ef85e8  2007.0/i586/wpa_supplicant-0.5.5-2.3mdv2007.0.i586.rpm 
 e228e88670cae478d7f025013e21d487  2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
 ca8ad7710dc3f8f3a659de1c480b7f4a  2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 9474e50b228b594ed8a8ee31d85c2a13  2007.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
 d0fab326d4ebcccb814e7afc78c62023  2007.0/x86_64/wpa_gui-0.5.5-2.3mdv2007.0.x86_64.rpm
 2b8ea9b48f395ff7f407774444989dfc  2007.0/x86_64/wpa_supplicant-0.5.5-2.3mdv2007.0.x86_64.rpm 
 e228e88670cae478d7f025013e21d487  2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
 ca8ad7710dc3f8f3a659de1c480b7f4a  2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 f7e6a1f9fcf31eace993c3732fff56e2  2007.1/i586/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
 8be4e877f8f1302312fc8e87204099c0  2007.1/i586/wpa_gui-0.5.7-1.3mdv2007.1.i586.rpm
 11e5d5478132946e0ba0af05b4a95d93  2007.1/i586/wpa_supplicant-0.5.7-1.3mdv2007.1.i586.rpm 
 dfdd7c77a9613d4617581202835dae8b  2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
 6d3ac2467ad746a431cb7ba29d223490  2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 1d02ba56908361b47b734744037aacf9  2007.1/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
 51a6280d852c1a0cdd7068e79138e4ac  2007.1/x86_64/wpa_gui-0.5.7-1.3mdv2007.1.x86_64.rpm
 56666aee7b298754788cfdbd983b9fdb  2007.1/x86_64/wpa_supplicant-0.5.7-1.3mdv2007.1.x86_64.rpm 
 dfdd7c77a9613d4617581202835dae8b  2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
 6d3ac2467ad746a431cb7ba29d223490  2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 e854f61c347877fd0ee65bc2c0218337  2008.0/i586/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
 e04b222093d69d2049c7439dd2e806b1  2008.0/i586/wpa_gui-0.6.0-1.2mdv2008.0.i586.rpm
 e43ac8caaada63eeaacf980eebe14ceb  2008.0/i586/wpa_supplicant-0.6.0-1.2mdv2008.0.i586.rpm 
 a2aa4eb6917a165427de69725064e8b7  2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
 fd704402aad00c89cc23d22a78e892c4  2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 90194015eb52160071fd74743ef6c198  2008.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
 f041b8320f9f363b58d3c548312151b0  2008.0/x86_64/wpa_gui-0.6.0-1.2mdv2008.0.x86_64.rpm
 3f76dbf8e0758bd949713f224142038c  2008.0/x86_64/wpa_supplicant-0.6.0-1.2mdv2008.0.x86_64.rpm 
 a2aa4eb6917a165427de69725064e8b7  2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
 fd704402aad00c89cc23d22a78e892c4  2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHhte0mqjQ0CJFipgRArqpAJ99VOakpyKJ/pl5N59yBHqOFBmPsACfVQ96
C1t/vXtXiFg1QtY3/73pZTw=
=hRSd
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ