DEBIAN-CVE-2022-0585

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-0585
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-0585.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-0585
Upstream
Published
2022-02-18T18:15:11Z
Modified
2025-09-19T07:32:50.094869Z
Summary
[none]
Details

Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file

References

Affected packages

Debian:11 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.16-0+deb11u1

Affected versions

3.*

3.4.4-1
3.4.6-1~exp1
3.4.7-1~exp1
3.4.7-1
3.4.8-1
3.4.9-1
3.4.10-0+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / wireshark

Package

Name
wireshark
Purl
pkg:deb/debian/wireshark?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}