Bug 1891668 (CVE-2020-27617)

Summary: CVE-2020-27617 QEMU: net: an assert failure via eth_get_gso_type
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: ailan, berrange, cfergeau, drjones, imammedo, itamar, jen, jferlan, jmaloy, knoel, mkenneth, mrezanin, mst, ondrejj, pbonzini, philmd, ribarry, rjones, virt-maint, virt-maint, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: QEMU 5.2.0 Doc Type: ---
Doc Text:
An assert(3) failure flaw was found in the networking helper functions of QEMU. This vulnerability can occur in the eth_get_gso_type() routine if a packet does not have a valid networking L3 protocol (ex. IPv4, IPv6) value. This flaw allows a guest user to crash the QEMU process on the host, resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-08-10 19:28:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1891669, 1892347, 1892348, 1892349, 1892350, 1894504, 1910668, 1939494    
Bug Blocks: 1879504    

Description Prasad Pandit 2020-10-27 03:15:56 UTC
An assert(3) failure issue was found in the networking helper functions of QEMU. It could occur in the eth_get_gso_type() routine, if a packet does not have a valid networking L3 protocol (ex. IPv4, IPv6) value. A guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

Upstream patch:
---------------
  -> https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06023.html

Comment 1 Prasad Pandit 2020-10-27 03:16:03 UTC
Acknowledgments:

Name: Gaoning Pan (Zhejiang University)

Comment 2 Prasad Pandit 2020-10-27 03:22:43 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1891669]

Comment 8 errata-xmlrpc 2021-08-10 13:50:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:3061 https://access.redhat.com/errata/RHSA-2021:3061

Comment 9 Product Security DevOps Team 2021-08-10 19:28:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27617