In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.5"
}
]
}