The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2010-04-12 11:30
Updated : 2023-02-12 20:16
NVD link : CVE-2010-0741
Mitre link : CVE-2010-0741
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
qemu
- qemu
linux
- linux_kernel
kvm_qumranet
- kvm