A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:4492 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-3567 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2274339 | issue tracking |
https://gitlab.com/qemu-project/qemu/-/issues/2273 | issue tracking exploit |
https://security.netapp.com/advisory/ntap-20240822-0007/ |