The DVB-S2-BB dissector could go into an infinite loop. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 2001868]
References: https://github.com/wireshark/wireshark/commit/0137c24d60934f131b25506a88c9464e4dc827de https://github.com/wireshark/wireshark/commit/0d8be1fb797b3d65f1c2c204da76af8e8de6d3cc
Flaw was introduced in the following commit: https://github.com/wireshark/wireshark/commit/4bf4ee88f0544727e7f89f3f288c6afd2f650a4c This commit was never introduced into any of our streams in RHEL 8 and below. RHEL 9 uses a fixed version of wireshark that does not contain this flaw. As such, no RHEL versions are affected by this flaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-22222