[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2010-0741 qemu: Improper handling of erroneous data provided by
From:       Petr Matousek <pmatouse () redhat ! com>
Date:       2010-03-29 12:36:42
Message-ID: alpine.LFD.2.01.1003291431210.2892 () localhost
[Download RAW message or body]

Hello vendors,

    Josh Bressers has assigned a CVE id CVE-2010-0741 to the following bug:

A flaw was found in the way the QEMU-KVM handled erroneous data provided 
by the guest Linux virtio-net driver. Due deficiency in the implementation 
of the TSO (TCP segment offloading), the guest's virtio-net driver 
transmitted improper data to the particular QEMU-KVM process on the host, 
resulting in its termination. A remote attacker could use this flaw to 
cause denial of service (guest crash) by sending certain, 
specially-crafted data to arbitrary open port on the target guest system.

A remote attacker could exploit this to crash guests which use virtio
networking on Linux kernels earlier than 2.6.26.

Note that this was previously reported in Canonical's launchpad but no CVE 
name was ever assigned AFAIK.

References:
-----------
https://bugzilla.redhat.com/show_bug.cgi?id=577218
https://patchwork.kernel.org/patch/56479/
https://bugs.edge.launchpad.net/ubuntu/+source/qemu-kvm/+bug/458521
http://lists.gnu.org/archive/html/qemu-devel/2009-10/msg02480.html

Upstream patch:
---------------
http://git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commit;h=184bd0484533b725194fa517ddc271ffd74da7c9

Thanks && Regards, Petr.
--
Petr Matousek / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic