Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0741

Опубликовано: 12 апр. 2010
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.8

Описание

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-28.70
intrepid

ignored

end of life, was needed
jaunty

not-affected

karmic

not-affected

lucid

not-affected

upstream

released

2.6.27

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 83%
0.0211
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

nvd
около 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

debian
около 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio- ...

github
около 3 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

oracle-oval
около 15 лет назад

ELSA-2010-0271: kvm security, bug fix and enhancement update (IMPORTANT)

EPSS

Процентиль: 83%
0.0211
Низкий

7.8 High

CVSS2