It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. References: https://www.wireshark.org/security/wnpa-sec-2020-20.html https://gitlab.com/wireshark/wireshark/-/issues/17073
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26422
Statement: This flaw does not affect wireshark as shipped in Red Hat Enterprise Linux 5, 6, 7, or 8 because the affected code was introduced in a more recent version of wireshark than those shipped.