{"id":"CVE-2022-3190","details":"Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file","modified":"2026-04-02T08:03:36.453447Z","published":"2022-09-13T00:00:00Z","related":["ALSA-2023:2373","SUSE-SU-2022:3309-1","openSUSE-SU-2024:12329-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3190.json","cna_assigner":"GitLab"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3190.json"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2022-06.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/3xxx/CVE-2022-3190.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CH4NUKZKPY4MFQHFBTONJK2AWES4DFDA/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YR5LIOF5VKS4DC2NQWXTMPPXOYJC46XC/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3190"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/18307"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"9733f173ea5e6255e8da208ef183210aa264d948"},{"fixed":"428db086d7910d178a2e137d8ef8d3029aeb6301"},{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"d25900c51508135ac54abfa66a7a07176cdee041"}],"database_specific":{"versions":[{"introduced":"3.4.0"},{"fixed":"3.4.16"},{"introduced":"3.6.0"},{"fixed":"3.6.8"}]}}],"versions":["v3.4.0","v3.4.1","v3.4.10","v3.4.10rc0","v3.4.11","v3.4.11rc0","v3.4.12","v3.4.12rc0","v3.4.13","v3.4.13rc0","v3.4.14","v3.4.14rc0","v3.4.15","v3.4.15rc0","v3.4.16rc0","v3.4.1rc0","v3.4.2","v3.4.2rc0","v3.4.3","v3.4.3rc0","v3.4.4","v3.4.4rc0","v3.4.5","v3.4.5rc0","v3.4.6","v3.4.6rc0","v3.4.7","v3.4.7rc0","v3.4.8","v3.4.8rc0","v3.4.9","v3.4.9rc0","v3.6.0","v3.6.1","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8rc0","wireshark-3.4.0","wireshark-3.4.1","wireshark-3.4.10","wireshark-3.4.11","wireshark-3.4.12","wireshark-3.4.13","wireshark-3.4.14","wireshark-3.4.15","wireshark-3.4.2","wireshark-3.4.3","wireshark-3.4.4","wireshark-3.4.5","wireshark-3.4.6","wireshark-3.4.7","wireshark-3.4.8","wireshark-3.4.9","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3190.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"d25900c51508135ac54abfa66a7a07176cdee041"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"fixed":"3.6.8"}]}},{"type":"GIT","repo":"https://gitlab.com/wireshark/wireshark","events":[{"introduced":"9733f173ea5e6255e8da208ef183210aa264d948"},{"fixed":"428db086d7910d178a2e137d8ef8d3029aeb6301"}],"database_specific":{"versions":[{"introduced":"3.4.0"},{"fixed":"3.4.16"}]}}],"versions":["v3.4.0","v3.4.1","v3.4.10","v3.4.10rc0","v3.4.11","v3.4.11rc0","v3.4.12","v3.4.12rc0","v3.4.13","v3.4.13rc0","v3.4.14","v3.4.14rc0","v3.4.15","v3.4.15rc0","v3.4.16rc0","v3.4.1rc0","v3.4.2","v3.4.2rc0","v3.4.3","v3.4.3rc0","v3.4.4","v3.4.4rc0","v3.4.5","v3.4.5rc0","v3.4.6","v3.4.6rc0","v3.4.7","v3.4.7rc0","v3.4.8","v3.4.8rc0","v3.4.9","v3.4.9rc0","v3.6.0","v3.6.1","v3.6.1rc0","v3.6.2","v3.6.2rc0","v3.6.3","v3.6.3rc0","v3.6.4","v3.6.4rc0","v3.6.5","v3.6.5rc0","v3.6.6","v3.6.6rc0","v3.6.7","v3.6.7rc0","v3.6.8rc0","wireshark-3.4.0","wireshark-3.4.1","wireshark-3.4.10","wireshark-3.4.11","wireshark-3.4.12","wireshark-3.4.13","wireshark-3.4.14","wireshark-3.4.15","wireshark-3.4.2","wireshark-3.4.3","wireshark-3.4.4","wireshark-3.4.5","wireshark-3.4.6","wireshark-3.4.7","wireshark-3.4.8","wireshark-3.4.9","wireshark-3.6.0","wireshark-3.6.1","wireshark-3.6.2","wireshark-3.6.3","wireshark-3.6.4","wireshark-3.6.5","wireshark-3.6.6","wireshark-3.6.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3190.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}