The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).
References
Configurations
Configuration 1 (hide)
AND |
|
History
13 Feb 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
Summary | The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO). | |
References |
|
02 Feb 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | CVE-2010-0741 qemu: Improper handling of erroneous data provided by Linux virtio-net driver |
Information
Published : 2010-04-12 18:30
Updated : 2023-12-10 11:03
NVD link : CVE-2010-0741
Mitre link : CVE-2010-0741
CVE.ORG link : CVE-2010-0741
JSON object : View
Products Affected
linux
- linux_kernel
kvm_qumranet
- kvm
qemu
- qemu
CWE
CWE-20
Improper Input Validation