kvm is vulnerable to denial of service. A flaw was found in the way QEMU-KVM handled erroneous data provided by the Linux virtio-net driver, used by guest operating systems. Due to a deficiency in the TSO (TCP segment offloading) implementation, a guest’s virtio-net driver would transmit improper data to a certain QEMU-KVM process on the host, causing the guest to crash. A remote attacker could use this flaw to send specially-crafted data to a target guest system, causing that guest to crash.
git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commit%3Bh=184bd0484533b725194fa517ddc271ffd74da7c9
git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commit;h=184bd0484533b725194fa517ddc271ffd74da7c9
lists.gnu.org/archive/html/qemu-devel/2009-10/msg02480.html
lists.gnu.org/archive/html/qemu-devel/2009-10/msg02495.html
openwall.com/lists/oss-security/2010/03/29/4
securitytracker.com/id?1023798
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0271.html
www.vupen.com/english/advisories/2010/0760
access.redhat.com/errata/RHSA-2010:0271
access.redhat.com/errata/RHSA-2010:0476
access.redhat.com/security/cve/CVE-2010-0741
bugs.edge.launchpad.net/ubuntu/+source/qemu-kvm/+bug/458521
bugzilla.redhat.com/show_bug.cgi?id=577218
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11143
patchwork.kernel.org/patch/56479/
rhn.redhat.com/errata/RHSA-2010-0476.html