In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7748.json"