First published: Wed Apr 10 2024(Updated: )
An assertion failure issue was found in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. A malicious guest could use this flaw to crash QEMU and cause a denial of service condition. Upstream issue & patch: <a href="https://gitlab.com/qemu-project/qemu/-/issues/2273">https://gitlab.com/qemu-project/qemu/-/issues/2273</a> <a href="https://patchew.org/QEMU/20240410070459.49112-1-philmd@linaro.org/">https://patchew.org/QEMU/20240410070459.49112-1-philmd@linaro.org/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2274339 is critical due to the potential denial of service it can cause.
To fix REDHAT-BUG-2274339, you should apply the latest patches provided by QEMU.
The impact of REDHAT-BUG-2274339 is that a malicious guest could crash QEMU, leading to a denial of service.
REDHAT-BUG-2274339 affects QEMU, specifically versions that utilize the update_sctp_checksum() function in hw/net/net_tx_pkt.c.
Currently, there are no documented workarounds for REDHAT-BUG-2274339 other than updating to the patched version of QEMU.