Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for xorg-x11-drv-qxl RHSA-2013:0218-01
Summary:The remote host is missing an update for the 'xorg-x11-drv-qxl'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'xorg-x11-drv-qxl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The xorg-x11-drv-qxl package provides an X11 video driver for the QEMU QXL
video accelerator. This driver makes it possible to use Red Hat Enterprise
Linux 6 as a guest operating system under the KVM kernel module and the
QEMU multi-platform emulator, using the SPICE protocol.

A flaw was found in the way the host's qemu-kvm qxl driver and the guest's
X.Org qxl driver interacted when a SPICE connection terminated. A user able
to initiate a SPICE connection to a guest could use this flaw to make the
guest temporarily unavailable or, potentially (if the sysctl
kernel.softlockup_panic variable was set to '1' in the guest), crash the
guest. (CVE-2013-0241)

All users of xorg-x11-drv-qxl are advised to upgrade to this updated
package, which contains a backported patch to correct this issue. All
running X.Org server instances using the qxl driver must be restarted for
this update to take effect.

Affected Software/OS:
xorg-x11-drv-qxl on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-0241
RedHat Security Advisories: RHSA-2013:0218
XForce ISS Database: qxl-virtual-spice-dos(81704)
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.