Описание
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:9.0.2+ds-4ubuntu2 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
focal | not-affected | code not present |
jammy | not-affected | code not present |
mantic | ignored | end of life, was needs-triage |
noble | needs-triage | |
oracular | released | 1:9.0.2+ds-4ubuntu2 |
Показывать по
EPSS
5.5 Medium
CVSS3
Связанные уязвимости
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
A flaw was found in QEMU. An assertion failure was present in the upda ...
EPSS
5.5 Medium
CVSS3