The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
https://support.apple.com/HT208221
https://security.gentoo.org/glsa/201709-23
https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125
https://access.redhat.com/errata/RHEA-2018:0705
http://www.tcpdump.org/tcpdump-changes.txt