A heap based buffer overflow in Wireshark's NetScreen file parser may lead to a local arbitrary code execution via a crafted capture file. References: https://www.wireshark.org/security/wnpa-sec-2023-29.html https://gitlab.com/wireshark/wireshark/-/issues/19404
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 2250155]