The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
Created tcpdump tracking bugs for this issue:
Affects: fedora-all [bug 1760626]
While printing a RSVP packet, function rsvp_obj_print() in print-rsvp.c can read beyond the limits of the captured buffer, if there are not enough bytes in the buffer to read 32bits. This may print memory data on the victim's screen or crash the tcpdump application if non mapped memory is accessed.