It was found that IEEE dissector could crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Upstream bug(s): https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686 External References: https://www.wireshark.org/security/wnpa-sec-2018-43.html
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1607334]
The wireshark shipped in Red Hat Enterprise Linux 6 and 7 do not have the dot11crypt traffic recognition functionality. $ tshark -Vxr clusterfuzz-testcase-minimized-fuzzshark_ip_proto-udp-5122206420959232.pcap tshark: The file "clusterfuzz-testcase-minimized-fuzzshark_ip_proto-udp-5122206420959232.pcap" contains record data that TShark doesn't support. (pcap: network type 252 unknown or unsupported)
Statement: This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 6 and 7 (versions 1.8.10 and 1.10.14, respectively).