New upstream madwifi release (9.3.3) fixes DoS attack

Bug #156203 reported by Andrew Hunter
264
Affects Status Importance Assigned to Milestone
linux-restricted-modules-2.6.22 (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

Binary package hint: linux-restricted-modules

This release mainly fixes compilation issues with kernel 2.6.23 and hopefully the upcoming 2.6.24.

In addition the fix for a security issue (CVE-2007-5448, xrates element remote DoS) has been backported from trunk.

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5448

http://madwifi.org/changeset/2736

Tags: madwifi

CVE References

Revision history for this message
Andrew Hunter (rexbron) wrote :

New ath5k driver in 2.6.27, closing as invalid.

Changed in linux-restricted-modules-2.6.22:
status: New → Invalid
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.