Hide Forgot
Linux kernel built with the cfg80211 - wireless configuration API support(CONFIG_CFG80211) is vulnerable to a potential DoS caused by buffer over-read while parsing wireless packet header. Upstream fix: ------------- -> https://git.kernel.org/linus/f5563318ff1bde15b10e736e97ffce13be08bc1a
Red Hat does not consider this to be a security flaw. The issue is an OOB read of 4 bytes beyond the "radiotap" header. Though this value is out of header bounds, it is well within the network socket buffer(sk_buff) object. It is not an OOB read which would result in a system crash(DoS) due to invalid read access. Statement: The Red Hat Security Response Team does not consider this issue to be a security flaw. For more details please refer to https://bugzilla.redhat.com/show_bug.cgi?id=1040010#c1