{"id":"CVE-2022-0583","details":"Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file","modified":"2026-04-08T04:05:15.368632Z","published":"2022-02-14T00:00:00Z","related":["SUSE-SU-2022:0722-1","openSUSE-SU-2022:0722-1","openSUSE-SU-2024:11858-1"],"database_specific":{"cna_assigner":"GitLab","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0583.json"},"references":[{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0583.json"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2022-03.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0583.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRJ24JRKLA6XMDKLGVTOPM5KBBU4UHLN/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3DZD2JU56ZI4XV2B3HGVGA5PXQDNA5T/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0583"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-04"},{"type":"REPORT","url":"https://gitlab.com/wireshark/wireshark/-/issues/17840"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00041.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wireshark/wireshark","events":[{"introduced":"9733f173ea5e6255e8da208ef183210aa264d948"},{"fixed":"398502390084297914efed5e7c31e731453336f0"},{"introduced":"3a34e44d02c9c91f9f851bd6f29ff4505131b127"},{"fixed":"626020d9b3c3e469130b09429106b20dcb6afee3"}],"database_specific":{"versions":[{"introduced":"3.4.0"},{"fixed":"3.4.12"},{"introduced":"3.6.0"},{"fixed":"3.6.2"}]}}],"versions":["v3.4.0","v3.4.1","v3.4.10","v3.4.10rc0","v3.4.11","v3.4.11rc0","v3.4.12rc0","v3.4.1rc0","v3.4.2","v3.4.2rc0","v3.4.3","v3.4.3rc0","v3.4.4","v3.4.4rc0","v3.4.5","v3.4.5rc0","v3.4.6","v3.4.6rc0","v3.4.7","v3.4.7rc0","v3.4.8","v3.4.8rc0","v3.4.9","v3.4.9rc0","v3.6.0","v3.6.1","v3.6.1rc0","v3.6.2rc0","wireshark-3.4.0","wireshark-3.4.1","wireshark-3.4.10","wireshark-3.4.11","wireshark-3.4.2","wireshark-3.4.3","wireshark-3.4.4","wireshark-3.4.5","wireshark-3.4.6","wireshark-3.4.7","wireshark-3.4.8","wireshark-3.4.9","wireshark-3.6.0","wireshark-3.6.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0583.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}