A flaw was found in the way the QEMU-KVM handled erroneous data provided by the guest Linux virtio-net driver. Due deficiency in the implementation of the TSO (TCP segment offloading), the guest's virtio-net driver transmitted improper data to the particular QEMU-KVM process on the host, resulting in its termination. A remote attacker could use this flaw to cause denial of service (guest crash) by sending certain, specially-crafted data to arbitrary open port on the target guest system. A remote attacker could exploit this to crash guests which use virtio networking on Linux kernels earlier than 2.6.26.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0271 https://rhn.redhat.com/errata/RHSA-2010-0271.html
Change the bug to verified according to the bug 577243#c7.
Update the comment #7: Change the bug to verified according to the bug 577243#c4.
This issue has been addressed in following products: Red Hat Enterprise Virtualization for RHEL-5 Via RHSA-2010:0476 https://rhn.redhat.com/errata/RHSA-2010-0476.html