The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "249449000474338159132286175935987832010",
"length": 926.0
},
"target": {
"function": "frag6_print",
"file": "print-frag6.c"
},
"id": "CVE-2017-13031-6be3a48c",
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125",
"signature_type": "Function"
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"212234958766796697032698289877259867767",
"65964685045951631495872603834156534696",
"6176987505694048708101376711871407365",
"46494900475245500499264915132677012018"
],
"threshold": 0.9
},
"target": {
"file": "print-frag6.c"
},
"id": "CVE-2017-13031-74444da4",
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125",
"signature_type": "Line"
}
]