In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression. References: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=76afda963de4f0b9be24f2d8e873990a5cbf221b
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1868886]
External References: https://www.wireshark.org/security/wnpa-sec-2020-10.html
Statement: Wireshark as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8 is not affected because the vulnerable code was committed in newer versions of the package than those shipped.
Flaw Summary: A double-free in /epan/dissectors/packet-kafka.c's lz4 decompression functionality allowed for a crash of wireshark when processing a specially crafted packet. This could result in a temporary denial of service.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-17498