First published: Thu Aug 13 2020(Updated: )
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | >=3.2.0<3.2.6 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
ubuntu/wireshark | <3.2.3-1ubuntu0.1~ | 3.2.3-1ubuntu0.1~ |
ubuntu/wireshark | <3.2.6-1 | 3.2.6-1 |
debian/wireshark | 2.6.20-0+deb10u4 2.6.20-0+deb10u8 3.4.10-0+deb11u1 4.0.11-1~deb12u1 4.2.2-1 4.2.2-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Wireshark vulnerability is CVE-2020-17498.
The severity of CVE-2020-17498 is medium (6.5).
The Kafka protocol dissector in Wireshark can crash due to a double free during LZ4 decompression.
Wireshark versions 3.2.0 to 3.2.5 are affected by CVE-2020-17498.
To fix CVE-2020-17498 in Wireshark, upgrade to version 3.2.6 or later.