Unrated severityNVD Advisory· Published Feb 18, 2022· Updated Nov 3, 2025
CVE-2022-0585
CVE-2022-0585
Description
Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
Affected products
25- osv-coords24 versionspkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/wireshark&distro=openSUSE%20Tumbleweedpkg:rpm/suse/wireshark&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/wireshark&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/wireshark&distro=SUSE%20Manager%20Server%204.1
< 3.6.2-3.71.1+ 23 more
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-2.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
- (no CPE)range: < 3.6.2-3.71.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/mitrevendor-advisory
- security.gentoo.org/glsa/202210-04mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2022/03/msg00041.htmlmitremailing-list
- gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0585.jsonmitre
- www.wireshark.org/security/wnpa-sec-2022-02.htmlmitre
News mentions
0No linked articles in our index yet.