Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."Referenceshttp://www.securityfocus.com/bid/32484http://secunia.com/advisories/32998http://secunia.com/advisories/33706http://secunia.com/advisories/33641http://www.redhat.com/support/errata/RHSA-2009-0053.htmlhttp://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=48735d8d8bd701b1e0cd3d49c21e5e385ddcb077https://usn.ubuntu.com/714-1/https://bugzilla.redhat.com/show_bug.cgi?id=470761http://article.gmane.org/gmane.linux.kernel.wireless.general/23049http://openwall.com/lists/oss-security/2008/11/11/2http://secunia.com/advisories/33854http://www.debian.org/security/2008/dsa-1681http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html