aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:58:40Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6907[3.5] wireshark: Memory exhaustion/infinite loop via malformed STANAG 4607 ca...2019-07-23T11:58:40ZAlicha CH[3.5] wireshark: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file (CVE-2017-6014)In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607
capture file will cause an infinite loop and memory exhaustion.
If the packet size field in a packet header is null, the offset to read
from will not advance, causing c...In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607
capture file will cause an infinite loop and memory exhaustion.
If the packet size field in a packet header is null, the offset to read
from will not advance, causing continuous attempts to read the same
zero length packet. This will quickly exhaust all system memory.
### References:
https://bugs.wireshark.org/bugzilla/show\_bug.cgi?id=13416
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6014
*(from redmine: issue id 6907, created on 2017-02-21, closed on 2019-05-03)*
* Relations:
* parent #6905
* Changesets:
* Revision 0713e068b75f53010649e8267a305b58a821f197 by Sergei Lukin on 2017-02-23T07:35:01Z:
```
main/wireshark: security fixes #6907
CVE-2017-6014: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file
```3.5.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6906[3.6] wireshark: Memory exhaustion/infinite loop via malformed STANAG 4607 c...2019-07-23T11:58:41ZAlicha CH[3.6] wireshark: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file (CVE-2017-6014)In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607
capture file will cause an infinite loop and memory exhaustion.
If the packet size field in a packet header is null, the offset to read
from will not advance, causing c...In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607
capture file will cause an infinite loop and memory exhaustion.
If the packet size field in a packet header is null, the offset to read
from will not advance, causing continuous attempts to read the same
zero length packet. This will quickly exhaust all system memory.
### References:
https://bugs.wireshark.org/bugzilla/show\_bug.cgi?id=13416
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6014
*(from redmine: issue id 6906, created on 2017-02-21, closed on 2019-05-03)*
* Relations:
* parent #6905
* Changesets:
* Revision 072fede08fb5b21fc94d4175e7b9d3a2959c7328 by Sergei Lukin on 2017-02-22T12:21:48Z:
```
main/wireshark: security fixes #6906
CVE-2017-6014: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file
```3.6.0Natanael CopaNatanael Copa