The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). Upstream patch: https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739 References: https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Created tcpdump tracking bugs for this issue: Affects: fedora-all [bug 1760626]
While printing a RSVP packet, function rsvp_obj_print() in print-rsvp.c can read beyond the limits of the captured buffer, if there are not enough bytes in the buffer to read 32bits. This may print memory data on the victim's screen or crash the tcpdump application if non mapped memory is accessed.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14465
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4760 https://access.redhat.com/errata/RHSA-2020:4760