Ralph Shumaker wrote:
[snip]

Posting links from Slashdot doesn't have much value. But if you had done a modicum of research you could have enlightened us. For example, I saw that article and wondered about how long the vulnerability existed. So I went to CERT <http://www.cert.org> and did a search on madwifi. I found that CERT had issued an advisory in early DECEMBER 2006 (2006-12-08) <http://www.kb.cert.org/vuls/id/925529>. From there I found that the madwifi folks had issued the patch ONE DAY BEFORE THE ADVISORY. A fixed version of the madwifi drivers has been available since that day.


Odd that.

You didn't answer Lan's question. He (nor I) saw your warning. When did you warn us?

I didn't need to, because I know that as good security conscience Linux users you keep your systems up to date, subscribe to the CERT list and periodically review sites like Security Focus <http://www.securityfocus.com>

But just in case you don't do that, here are some of the latest items from Security Focus:

    * X.Org X11 XC-MISC Extension Integer Overflow Vulnerability
    * KDE Konqueror/IOSlave FTP PASV Port-Scanning Vulnerability
    * KDE Konqueror KHTML Library Title Cross Site Scripting Vulnerability

CONSIDER YOURSELF WARNED!


Unless you haven't updated your madwifi drivers since mid-December 2006 and are still at less than version 0.9.2.1 you aren't vulnerable to this exploit.

The value in this story is that the following happened:
1) Someone found a flaw
2) They quietly contacted the madwifi team
3) The madwifi team fixed the flaw
4) The madwifi team publishes a fix
5) The world is notified that there is a problem and a fix is available

I think this is the way it should be.


Agreed!


The bad part of this story is that somehow something that was found and fixed over four months ago somehow rears it's head as a "My god, Linux has a bug!" and gets regurgitated all over the place.


I don't think that's what he was saying at all. I think he was rearing it as "My god, if you don't read such things (as I do not) and are not aware of it, you may be vulnerable and may wish to update at least this portion of your Linux, just in case y'all didn't know it." I really don't remember *ever* hearing Lan naysaying Linux. My god, Gus has a bug! (I won't say where.)

Perhaps I am unduly picking on Lan as he is just the messenger, but he had a choice of what message to deliver. The message was the article on PC World offered without comment. And it was the article on PC World that was alarmist.

And yes, I have many bugs :o


Gus

PS. Ford Pinto's may explode when crashed!


Sarcasm duly noted. Nevertheless, if there is anyone out there who even still has a Pinto and doesn't know about this flaw, then it truly is a good thing that you are warning them about it. Thank you for your *much* belated warning.

I, for one, am glad that Lan presented this. I did not know about it. And I still run FC4. I'm pretty sure I don't have the update since my yum stopped working in FC4. Anyway, I'm not currently at risk since I have no wireless devices (except my cell phone and my infrared remotes).

And I'm surprised that anyone would still be running FC4. According to the Fedora Legacy project <http://fedoralegacy.org/>, the whole thing has been shut down.

Your yum updates stopped working and you didn't even bother to find out why?

Gus


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to