First published: Fri Mar 26 2010(Updated: )
A flaw was found in the way the QEMU-KVM handled erroneous data provided by the guest Linux virtio-net driver. Due deficiency in the implementation of the TSO (TCP segment offloading), the guest's virtio-net driver transmitted improper data to the particular QEMU-KVM process on the host, resulting in its termination. A remote attacker could use this flaw to cause denial of service (guest crash) by sending certain, specially-crafted data to arbitrary open port on the target guest system. A remote attacker could exploit this to crash guests which use virtio networking on Linux kernels earlier than 2.6.26.
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU QEMU-KVM | ||
Linux Kernel | <2.6.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-577218 is considered high due to the potential for improper data handling that can lead to security vulnerabilities.
To fix REDHAT-BUG-577218, update QEMU-KVM and the affected Linux Kernel versions to the latest stable releases.
REDHAT-BUG-577218 affects QEMU-KVM and Linux Kernel versions up to 2.6.26.
REDHAT-BUG-577218 is a vulnerability associated with improper data handling in the TCP segment offloading implemented by the virtio-net driver.
A recommended workaround for REDHAT-BUG-577218 includes disabling TCP segment offloading in the virtio-net driver until a patch is applied.