Back to bug 2165825
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-01-31 08:47:59 UTC | CC | mruprich | |
| TEJ RATHI | 2023-01-31 08:48:48 UTC | Blocks | 2165003 | |
| Guilherme de Almeida Suckevicz | 2023-02-09 17:58:39 UTC | Depends On | 2168676 | |
| Guilherme de Almeida Suckevicz | 2023-02-09 18:02:29 UTC | Comment | 0 | updated |
| Guilherme de Almeida Suckevicz | 2023-02-09 19:27:24 UTC | Comment | 0 | updated |
| Guilherme de Almeida Suckevicz | 2023-02-10 17:23:28 UTC | Depends On | 2168956 | |
| Guilherme de Almeida Suckevicz | 2023-02-10 18:02:10 UTC | Doc Text | A flaw was found in the BPv6, NCP and RTPS dissectors of Wireshark when decoding malformed packets from a pcap file or from the network. This issue cause excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service. | |
| Paige Jung | 2023-02-10 18:19:56 UTC | Doc Text | A flaw was found in the BPv6, NCP and RTPS dissectors of Wireshark when decoding malformed packets from a pcap file or from the network. This issue cause excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service. | A flaw was found in the BPv6, NCP, and RTPS dissectors of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service. |
| FrantiĊĦek Hrdina | 2023-02-14 08:07:06 UTC | CC | fhrdina | |
| Guilherme de Almeida Suckevicz | 2023-02-14 17:57:32 UTC | Depends On | 2169833 | |
| Michal Ruprich | 2023-02-15 15:05:24 UTC | Status | NEW | CLOSED |
| Resolution | --- | WONTFIX | ||
| Keywords | Triaged | |||
| Last Closed | 2023-02-15 15:05:24 UTC | |||
| Michal Ruprich | 2023-02-15 15:07:49 UTC | Resolution | WONTFIX | --- |
| Status | CLOSED | NEW | ||
| Keywords | Reopened | |||
| Red Hat Bugzilla | 2023-07-07 08:34:13 UTC | Assignee | security-response-team | nobody |
Back to bug 2165825