wireshark is vulnerable to denial of service. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22173.json
gitlab.com/wireshark/wireshark/-/issues/17124
lists.fedoraproject.org/archives/list/[email protected]/message/GND3PIQC3KZALR227V4YUMPKJBA5BZG4/
lists.fedoraproject.org/archives/list/[email protected]/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/
security-tracker.debian.org/tracker/CVE-2021-22173
security.gentoo.org/glsa/202107-21
www.oracle.com/security-alerts/cpuApr2021.html
www.wireshark.org/security/wnpa-sec-2021-01.html