[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#765631: marked as done (unblock/ age to 5 days: wpa/2.3-1 (CVE-2014-3686, DSA-3052-1))



Your message dated Thu, 16 Oct 2014 20:50:02 +0200
with message-id <20141016185002.GN3591@betterave.cristau.org>
and subject line Re: Bug#765631: unblock/ age to 5 days: wpa/2.3-1 (CVE-2014-3686, DSA-3052-1)
has caused the Debian Bug report #765631,
regarding unblock/ age to 5 days: wpa/2.3-1 (CVE-2014-3686, DSA-3052-1)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
765631: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765631
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock
Severity: normal
X-Debbugs-CC: debian-boot@lists.debian.org

Hi

Please unblock the udeb producing package wpa and reduce its 
propagation time to 5 days. wpa 2.3-1 has been successfully built and
uploaded on all release architectures.

wpa <= 2.3-1 is vulnerable against a remotely exploitable security 
bug, which might allow attackers to inject an unsanitized string 
received from a remote device (potentially any device in radio 
range) to a privileged (typically root or netdev) system() call via 
wpa_cli/ hostapd_cli action scripts.

CVE-2014-3686	https://security-tracker.debian.org/tracker/CVE-2014-3686
DSA-3052-1	https://www.debian.org/security/2014/dsa-3052
#765352		https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765352


For debian-boot/ the upcoming stable point release (wheezy 7.7):
wpasupplicant-udeb, as used by d-i, does not contain the exploitable
binary (wpa_cli), which is only part of the full wpasupplicant/ hostapd
packages (these are already fixed via debian-security). Accordingly 
d-i's usage of wpa_supplicant is not suspectible to this security 
issue.


This is a new upstream version of wpa containing further changes and
features of wpa's stable integration branch[1], rather than a 
targetted fix.

unblock wpa/2.3-1

Regards
	Stefan Lippers-Hollmann

[1]	wpa 2.x is a continuous integration branch for bugfixes and new 
	features, rather than a dedicated	bugfix branch in the sense of 
	PostgreSQL or the linux kernel.

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
On Thu, Oct 16, 2014 at 20:33:53 +0200, Stefan Lippers-Hollmann wrote:

> Package: release.debian.org
> User: release.debian.org@packages.debian.org
> Usertags: unblock
> Severity: normal
> X-Debbugs-CC: debian-boot@lists.debian.org
> 
> Hi
> 
> Please unblock the udeb producing package wpa and reduce its 
> propagation time to 5 days. wpa 2.3-1 has been successfully built and
> uploaded on all release architectures.
> 
Aged, thanks for the notice!

Cheers,
Julien

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply to: