Back to bug 2165825

Who When What Removed Added
TEJ RATHI 2023-01-31 08:47:59 UTC CC mruprich
TEJ RATHI 2023-01-31 08:48:48 UTC Blocks 2165003
Guilherme de Almeida Suckevicz 2023-02-09 17:58:39 UTC Depends On 2168676
Guilherme de Almeida Suckevicz 2023-02-09 18:02:29 UTC Comment 0 updated
Guilherme de Almeida Suckevicz 2023-02-09 19:27:24 UTC Comment 0 updated
Guilherme de Almeida Suckevicz 2023-02-10 17:23:28 UTC Depends On 2168956
Guilherme de Almeida Suckevicz 2023-02-10 18:02:10 UTC Doc Text A flaw was found in the BPv6, NCP and RTPS dissectors of Wireshark when decoding malformed packets from a pcap file or from the network. This issue cause excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service.
Paige Jung 2023-02-10 18:19:56 UTC Doc Text A flaw was found in the BPv6, NCP and RTPS dissectors of Wireshark when decoding malformed packets from a pcap file or from the network. This issue cause excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service. A flaw was found in the BPv6, NCP, and RTPS dissectors of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service.
FrantiĊĦek Hrdina 2023-02-14 08:07:06 UTC CC fhrdina
Guilherme de Almeida Suckevicz 2023-02-14 17:57:32 UTC Depends On 2169833
Michal Ruprich 2023-02-15 15:05:24 UTC Status NEW CLOSED
Resolution --- WONTFIX
Keywords Triaged
Last Closed 2023-02-15 15:05:24 UTC
Michal Ruprich 2023-02-15 15:07:49 UTC Resolution WONTFIX ---
Status CLOSED NEW
Keywords Reopened
Red Hat Bugzilla 2023-07-07 08:34:13 UTC Assignee security-response-team nobody

Back to bug 2165825