A potential denial of service flaw due to a single byte overflow was found in the way tcpdump processes 802.11 packets: http://seclists.org/fulldisclosure/2007/Mar/0003.html The upstream patch is here: http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.42&r2=1.43 From inspecting our packages it seems that the initial, incorrect test isn't even present, which still leaves our packages vulnerable to this flaw.
This flaw also affects RHEL 3 and RHEL4. The code in question is not present in RHEL 2.1
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-0368.html