Bug 1868885 (CVE-2020-17498)

Summary: CVE-2020-17498 wireshark: Kafka protocol dissector could crash (wnpa-sec-2020-10)
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: denis, huzaifas, lemenkov, mruprich, msehnout, peter, rvokal, sergey.avseyev
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: wireshark 3.2.6 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-08-18 21:15:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1868886    
Bug Blocks: 1868887    

Description Dhananjay Arunesh 2020-08-14 06:48:53 UTC
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.

References:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=76afda963de4f0b9be24f2d8e873990a5cbf221b

Comment 1 Dhananjay Arunesh 2020-08-14 06:49:30 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1868886]

Comment 3 Dhananjay Arunesh 2020-08-14 06:51:22 UTC
External References:

https://www.wireshark.org/security/wnpa-sec-2020-10.html

Comment 4 Todd Cullum 2020-08-18 17:16:18 UTC
Statement:

Wireshark as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8 is not affected because the vulnerable code was committed in newer versions of the package than those shipped.

Comment 5 Todd Cullum 2020-08-18 17:27:59 UTC
Flaw Summary:

A double-free in /epan/dissectors/packet-kafka.c's lz4 decompression functionality allowed for a crash of wireshark when processing a specially crafted packet. This could result in a temporary denial of service.

Comment 6 Product Security DevOps Team 2020-08-18 21:15:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-17498