Bug 2165825 (CVE-2023-0411)
Summary: | CVE-2023-0411 wireshark: Multiple dissector excessive loops | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | fhrdina, mruprich |
Target Milestone: | --- | Keywords: | Reopened, Security, Triaged |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | wireshark 4.0.3, wireshark 3.6.11 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the BPv6, NCP, and RTPS dissectors of Wireshark. This issue occurs when decoding malformed packets from a pcap file or from the network, causing excessive consumption of CPU resources due to excessive loops, resulting in a Denial of Service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-02-15 15:05:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2168676, 2168956, 2169833 | ||
Bug Blocks: | 2165003 |
Description
TEJ RATHI
2023-01-31 08:46:40 UTC
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 2168676] Current version of wireshark in RHEL8 is 2.6.2 which means that bpv6 dissector is not part of our code base(added in later versions), the part of affected code for RTPS is also not present. As for NCP, I was not able to make wireshark crash with any of the provided .pcap files. I am closing this CVE. Feel free to reopen should you hit this or should you feel that this needs fixing in RHEL8. Sorry, I meant to close the CVE bug for my component but closed the one for Security Response. Reopening. |