First published: Wed Apr 10 2024(Updated: )
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | >=8.1.0<8.2.3 | |
QEMU | =9.0.0-rc0 | |
QEMU | =9.0.0-rc1 | |
QEMU | =9.0.0-rc2 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3567 has a high severity rating due to its potential to cause a denial of service condition.
To fix CVE-2024-3567, update QEMU to a version that is not affected, such as version 8.2.3 or later versions including 9.0.0-rc2.
CVE-2024-3567 affects QEMU versions from 8.1.0 to 8.2.3 and versions 9.0.0-rc0, 9.0.0-rc1, and 9.0.0-rc2.
CVE-2024-3567 allows a malicious guest to crash QEMU, leading to a denial of service.
CVE-2024-3567 affects QEMU regardless of the operating system, including Red Hat Enterprise Linux.