Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Jan 2013 17:37:32 +0100
From: Petr Matousek <>
Cc: Kurt Seifried <>
Subject: CVE request -- qxl: synchronous io guest DoS

A flaw was found in the way spice connection breakups were handled in
the qemu-kvm qxl driver. Some of the qxl port i/o commands were waiting
for the spice server to complete the actions, while the corresponding
thread holds qemu_mutex mutex, potentially blocking other threads in the
guest's qemu-kvm process. An user able to initiate spice connection to
the guest could use this flaw to make guest temporarily unavailable or,
in case kernel.softlockup_panic in the guest was set, crash the guest.

Upstream fixes:
xf86-video-qxl commit

which relies on qemu-kvm functionality introduced by commit;a=commit;h=5ff4e36c


Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.