In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
{ "versions": [ { "introduced": "2.2.0" }, { "last_affected": "2.2.12" }, { "introduced": "2.4.0" }, { "last_affected": "2.4.4" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-7321.json"