Your message dated Mon, 31 Dec 2007 07:52:14 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#446824: fixed in madwifi 1:0.9.2+r1842.20061207-2etch2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: madwifi-source
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for madwifi-source.

CVE-2007-5448[0]:
| Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial
| of service (panic) via a beacon frame with a large length value in the
| extended supported rates (xrates) element, which triggers an assertion
| error, related to net80211/ieee80211_scan_ap.c and
| net80211/ieee80211_scan_sta.c.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

This is fixed in upstream svn on:
http://madwifi.org/changeset/2736

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpVUJ448zP8R.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: madwifi
Source-Version: 1:0.9.2+r1842.20061207-2etch2

We believe that the bug you reported is fixed in the latest version of
madwifi, which is due to be installed in the Debian FTP archive:

madwifi-doc_0.9.2+r1842.20061207-2etch2_all.deb
  to pool/non-free/m/madwifi/madwifi-doc_0.9.2+r1842.20061207-2etch2_all.deb
madwifi-source_0.9.2+r1842.20061207-2etch2_all.deb
  to pool/non-free/m/madwifi/madwifi-source_0.9.2+r1842.20061207-2etch2_all.deb
madwifi_0.9.2+r1842.20061207-2etch2.diff.gz
  to pool/non-free/m/madwifi/madwifi_0.9.2+r1842.20061207-2etch2.diff.gz
madwifi_0.9.2+r1842.20061207-2etch2.dsc
  to pool/non-free/m/madwifi/madwifi_0.9.2+r1842.20061207-2etch2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Loic Minier <[EMAIL PROTECTED]> (supplier of updated madwifi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 30 Dec 2007 23:15:44 +0100
Source: madwifi
Binary: madwifi-doc madwifi-source
Architecture: source all
Version: 1:0.9.2+r1842.20061207-2etch2
Distribution: stable
Urgency: low
Maintainer: Debian madwifi team <[EMAIL PROTECTED]>
Changed-By: Loic Minier <[EMAIL PROTECTED]>
Description: 
 madwifi-doc - documentation for the Multiband Atheros Driver for WiFi
 madwifi-source - source for the Multiband Atheros Driver for WiFi
Closes: 446824
Changes: 
 madwifi (1:0.9.2+r1842.20061207-2etch2) stable; urgency=low
 .
   * Add 10_CVE-2007-5448_sanitize_xrates.dpatch from 1:0.9.3.2-2 to fix
     CVE-2007-5448:
     - DoS vulnerability via kassert from poor checking of xrate element in
       scan results (Closes: #446824)
Files: 
 1d5103a0fdbbe3284c0eee2be8721d09 831 non-free/net optional 
madwifi_0.9.2+r1842.20061207-2etch2.dsc
 e318f006bc29fb25b70e952fed4d9429 15509 non-free/net optional 
madwifi_0.9.2+r1842.20061207-2etch2.diff.gz
 42465bcbd432910d2da0ebe3c79209d6 3506650 non-free/net optional 
madwifi-source_0.9.2+r1842.20061207-2etch2_all.deb
 b393ecbf25f9e0d4203eedf372eabb6f 179052 non-free/doc optional 
madwifi-doc_0.9.2+r1842.20061207-2etch2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHeBvp4VUX8isJIMARAkVBAJ9sHwYoyhwwsbH+/GigZl5TyOZkfQCgpRxp
WS3upl0qfIfWiS8LR/hz7MA=
=+d70
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to