[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2010-0741 qemu: Improper handling of erroneous data provided by
From: Petr Matousek <pmatouse () redhat ! com>
Date: 2010-03-29 12:36:42
Message-ID: alpine.LFD.2.01.1003291431210.2892 () localhost
[Download RAW message or body]
Hello vendors,
Josh Bressers has assigned a CVE id CVE-2010-0741 to the following bug:
A flaw was found in the way the QEMU-KVM handled erroneous data provided
by the guest Linux virtio-net driver. Due deficiency in the implementation
of the TSO (TCP segment offloading), the guest's virtio-net driver
transmitted improper data to the particular QEMU-KVM process on the host,
resulting in its termination. A remote attacker could use this flaw to
cause denial of service (guest crash) by sending certain,
specially-crafted data to arbitrary open port on the target guest system.
A remote attacker could exploit this to crash guests which use virtio
networking on Linux kernels earlier than 2.6.26.
Note that this was previously reported in Canonical's launchpad but no CVE
name was ever assigned AFAIK.
References:
-----------
https://bugzilla.redhat.com/show_bug.cgi?id=577218
https://patchwork.kernel.org/patch/56479/
https://bugs.edge.launchpad.net/ubuntu/+source/qemu-kvm/+bug/458521
http://lists.gnu.org/archive/html/qemu-devel/2009-10/msg02480.html
Upstream patch:
---------------
http://git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commit;h=184bd0484533b725194fa517ddc271ffd74da7c9
Thanks && Regards, Petr.
--
Petr Matousek / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic