CVE-2024-3567

A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

10 Jun 2024, 18:39

Type Values Removed Values Added
CPE cpe:2.3:a:qemu:qemu:9.0.0:rc2:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:9.0.0:rc1:*:*:*:*:*:*
First Time Qemu qemu
Redhat
Redhat enterprise Linux
Qemu
References () https://access.redhat.com/security/cve/CVE-2024-3567 - () https://access.redhat.com/security/cve/CVE-2024-3567 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2274339 - () https://bugzilla.redhat.com/show_bug.cgi?id=2274339 - Issue Tracking
References () https://gitlab.com/qemu-project/qemu/-/issues/2273 - () https://gitlab.com/qemu-project/qemu/-/issues/2273 - Exploit, Issue Tracking
Summary
  • (es) Se encontró una falla en QEMU. Se produjo un error de aserción en la función update_sctp_checksum() en hw/net/net_tx_pkt.c al intentar calcular la suma de comprobación de un paquete fragmentado de tamaño corto. Esta falla permite que un invitado malintencionado bloquee QEMU y provoque una condición de denegación de servicio.

10 Apr 2024, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 15:16

Updated : 2024-06-10 18:39


NVD link : CVE-2024-3567

Mitre link : CVE-2024-3567

CVE.ORG link : CVE-2024-3567


JSON object : View

Products Affected

redhat

  • enterprise_linux

qemu

  • qemu
CWE
CWE-617

Reachable Assertion