In Wireshark 3.2.x before 3.2.1, the WASSP dissector could crash. This was addressed in epan/dissectors/packet-wassp.c by using >= and <= to resolve off-by-one errors. References: https://www.wireshark.org/security/wnpa-sec-2020-01.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16324 Upstream commit: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f90a3720b73ca140403315126e2a478c4f70ca03
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1796460]
The vulnerable code was added in https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c7854720c805ad3b96c1ceecff3be547f5748830, which extends the WASSP dissector. The commit first appeared in wireshark v3.1.0.
Statement: This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include the vulnerable code.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-7044