Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#12023 - ndiswrapper remote vulnerablity
Attached to Project:
Arch Linux
Opened by Jonathan Frazier (wide-eye) - Thursday, 06 November 2008, 22:32 GMT
Last edited by Tobias Powalowski (tpowa) - Friday, 07 November 2008, 09:05 GMT
Opened by Jonathan Frazier (wide-eye) - Thursday, 06 November 2008, 22:32 GMT
Last edited by Tobias Powalowski (tpowa) - Friday, 07 November 2008, 09:05 GMT
|
DetailsDescription:
"Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/275860 |
This task depends upon
Closed by Tobias Powalowski (tpowa)
Friday, 07 November 2008, 09:05 GMT
Reason for closing: Fixed
Additional comments about closing: 1.53-3 in testing
Friday, 07 November 2008, 09:05 GMT
Reason for closing: Fixed
Additional comments about closing: 1.53-3 in testing
Comment by Aaron Griffin (phrakture) -
Thursday, 06 November 2008, 22:39 GMT
- Field changed: Status (Unconfirmed → Assigned)
- Field changed: Priority (Normal → High)
- Task assigned to Tobias Powalowski (tpowa)
Set priority to High