First published: Wed Jan 30 2013(Updated: )
A flaw was found in the way spice connection breakups were handled in the qemu-kvm qxl driver. Some of the qxl port i/o commands were waiting for the spice server to complete the actions, while the corresponding thread holds qemu_mutex mutex, potentially blocking other threads in the guest's qemu-kvm process. An user able to initiate spice connection to the guest could use this flaw to make guest temporarily unavailable or, in case kernel.softlockup_panic in the guest was set, crash the guest. Upstream fixes: xf86-video-qxl commit <a href="http://cgit.freedesktop.org/xorg/driver/xf86-video-qxl/commit/?id=30b4b72cdbdf9f0e92a8d1c4e01779f60f15a741">http://cgit.freedesktop.org/xorg/driver/xf86-video-qxl/commit/?id=30b4b72cdbdf9f0e92a8d1c4e01779f60f15a741</a> which relies on qemu-kvm functionality introduced by commit <a href="http://git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commit;h=5ff4e36c">http://git.kernel.org/?p=virt/kvm/qemu-kvm.git;a=commit;h=5ff4e36c</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qxl Graphics Driver Project Xf86-video-qxl | =0.1.0 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.