+++ This bug was initially created as a clone of Bug #232347 +++ A potential denial of service flaw due to a single byte overflow was found in the way tcpdump processes 802.11 packets: http://seclists.org/fulldisclosure/2007/Mar/0003.html The upstream patch is here: http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.42&r2=1.43 From inspecting our packages it seems that the initial, incorrect test isn't even present, which still leaves our packages vulnerable to this flaw. -- Additional comment from bressers on 2007-03-14 17:12 EST -- This flaw also affects RHEL 3 and RHEL4. The code in question is not present in RHEL 2.1
Can we get this into 4.6? Cheers! Fábio
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-0387.html