It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. External References: https://www.wireshark.org/security/wnpa-sec-2018-46.html Upstream bug: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1625927]
Created attachment 1487125 [details] Patch
Impacts RHEL6/7. Invalid reads in valgrind, patch looks applicable.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16057
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1047 https://access.redhat.com/errata/RHSA-2020:1047