Vulnerability Description
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | >= 8.1.0, < 8.2.3 |
| Redhat | Enterprise Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:4492
- https://access.redhat.com/security/cve/CVE-2024-3567Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2274339Issue Tracking
- https://gitlab.com/qemu-project/qemu/-/issues/2273ExploitIssue Tracking
- https://access.redhat.com/security/cve/CVE-2024-3567Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2274339Issue Tracking
- https://gitlab.com/qemu-project/qemu/-/issues/2273ExploitIssue Tracking
- https://security.netapp.com/advisory/ntap-20240822-0007/
FAQ
What is CVE-2024-3567?
CVE-2024-3567 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This ...
How severe is CVE-2024-3567?
CVE-2024-3567 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3567?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Redhat Enterprise Linux.