Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
https://bugzilla.redhat.com/show_bug.cgi?id=470761
http://www.securityfocus.com/bid/32484
http://www.redhat.com/support/errata/RHSA-2009-0053.html
http://www.debian.org/security/2008/dsa-1681
http://secunia.com/advisories/33854
http://secunia.com/advisories/33706
http://secunia.com/advisories/33641
http://secunia.com/advisories/32998
http://openwall.com/lists/oss-security/2008/11/11/2
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
http://article.gmane.org/gmane.linux.kernel.wireless.general/23049