In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference. Upstream issue: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 Upstream patch: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3e319db1107b08fc3be804b6d449143ec9aa0dec External References: https://www.wireshark.org/security/wnpa-sec-2018-56.html
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1655944]
This issue seems to have been introduced with commit: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=281dd22da96daa105580bf25f064ddfdc99a719d which allowed to read 0 bytes from empty buffer without throwing exception when p == NULL and length == 0. However, p is later used which results in NULL pointer dereference. It affects only wireshark 2.6.4.
Statement: This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5, 6 and 7.