Linux kernel built with the cfg80211 - wireless configuration API
support(CONFIG_CFG80211) is vulnerable to a potential DoS caused by buffer
over-read while parsing wireless packet header.
Red Hat does not consider this to be a security flaw. The issue is an OOB read of 4 bytes beyond the "radiotap" header. Though this value is out of header bounds, it is well within the network socket buffer(sk_buff) object. It is not an OOB read which would result in a system crash(DoS) due to invalid read access.
The Red Hat Security Response Team does not consider this issue to be a security flaw. For more details please refer to https://bugzilla.redhat.com/show_bug.cgi?id=1040010#c1