eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg05731.html | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2020/11/02/1 | mailing list third party advisory patch |
https://lists.debian.org/debian-lts-announce/2020/11/msg00047.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20201202-0002/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html | third party advisory mailing list |