Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in Unsupported. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#12023 - ndiswrapper remote vulnerablity

Attached to Project: Arch Linux
Opened by Jonathan Frazier (wide-eye) - Thursday, 06 November 2008, 22:32 GMT
Last edited by Tobias Powalowski (tpowa) - Friday, 07 November 2008, 09:05 GMT
Task Type Bug Report
Category Packages: Core
Status Closed
Assigned To Tobias Powalowski (tpowa)
Architecture All
Severity Critical
Priority High
Reported Version None
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:

"Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux
kernel 2.6 allow remote attackers to execute arbitrary code by sending
packets over a local wireless network that specify long ESSIDs."

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/275860

This task depends upon

Closed by  Tobias Powalowski (tpowa)
Friday, 07 November 2008, 09:05 GMT
Reason for closing:  Fixed
Additional comments about closing:  1.53-3 in testing
Comment by Aaron Griffin (phrakture) - Thursday, 06 November 2008, 22:39 GMT
  • Field changed: Status (Unconfirmed → Assigned)
  • Field changed: Priority (Normal → High)
  • Task assigned to Tobias Powalowski (tpowa)
Set priority to High

Loading...