The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c. Upstream patch: https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4 References: https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Created tcpdump tracking bugs for this issue: Affects: fedora-all [bug 1760431]
Function rpl_dio_printopt() in print-icmp6.c may read outside the intended buffer while iterating over the options of a ICMP6 packet. If there are not enough bytes in the captured buffer to fill out the entire `rpl_dio_genoption` structure, the function may read beyond the limits of the captured buffer and it could potentially print to output wrong information. However, `opt` is never used to write anything, so this issue could result in junk memory being displayed on the terminal of the victim user or, at most, in the tcpdump program crashing while accessing invalid memory.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14882
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4760 https://access.redhat.com/errata/RHSA-2020:4760