|
![]() |
Problem Description |
MadWifi prior to 0.9.3.3 allowed remote attackers to cause a denial
of service (panic) via a beacon frame with a large length value in
the extended supported rates (xrates) element, which would trigger
an assertion error.
Updated packages have been updated to 0.9.3.3 to correct this
issue. Wpa_supplicant is built using madwifi-source and has been
rebuilt using 0.9.3.3 source.
Updated Packages |
Mandriva Linux 2007
994e5a529757654404fe20c659f01a81 2007.0/i586/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm 96337298e1b19ebf0680b704bb37aabc 2007.0/i586/wpa_gui-0.5.5-2.3mdv2007.0.i586.rpm b71e1f08dcecac80668c1e6486ef85e8 2007.0/i586/wpa_supplicant-0.5.5-2.3mdv2007.0.i586.rpm e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
9474e50b228b594ed8a8ee31d85c2a13 2007.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm d0fab326d4ebcccb814e7afc78c62023 2007.0/x86_64/wpa_gui-0.5.5-2.3mdv2007.0.x86_64.rpm 2b8ea9b48f395ff7f407774444989dfc 2007.0/x86_64/wpa_supplicant-0.5.5-2.3mdv2007.0.x86_64.rpm e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm
Mandriva Linux 2007.1
f7e6a1f9fcf31eace993c3732fff56e2 2007.1/i586/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm 8be4e877f8f1302312fc8e87204099c0 2007.1/i586/wpa_gui-0.5.7-1.3mdv2007.1.i586.rpm 11e5d5478132946e0ba0af05b4a95d93 2007.1/i586/wpa_supplicant-0.5.7-1.3mdv2007.1.i586.rpm dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm 6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64
1d02ba56908361b47b734744037aacf9 2007.1/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm 51a6280d852c1a0cdd7068e79138e4ac 2007.1/x86_64/wpa_gui-0.5.7-1.3mdv2007.1.x86_64.rpm 56666aee7b298754788cfdbd983b9fdb 2007.1/x86_64/wpa_supplicant-0.5.7-1.3mdv2007.1.x86_64.rpm dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm 6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm
Mandriva Linux 2008.0
e854f61c347877fd0ee65bc2c0218337 2008.0/i586/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm e04b222093d69d2049c7439dd2e806b1 2008.0/i586/wpa_gui-0.6.0-1.2mdv2008.0.i586.rpm e43ac8caaada63eeaacf980eebe14ceb 2008.0/i586/wpa_supplicant-0.6.0-1.2mdv2008.0.i586.rpm a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64
90194015eb52160071fd74743ef6c198 2008.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm f041b8320f9f363b58d3c548312151b0 2008.0/x86_64/wpa_gui-0.6.0-1.2mdv2008.0.x86_64.rpm 3f76dbf8e0758bd949713f224142038c 2008.0/x86_64/wpa_supplicant-0.6.0-1.2mdv2008.0.x86_64.rpm a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.