Skip to navigation

Bug Fix Advisory spice-server bug fix and enhancement update

Advisory: RHBA-2013:1571-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated spice-server packages that fix a number of bugs and add various
enhancements are now available for Red Hat Enterprise Linux 6.

The Simple Protocol for Independent Computing Environments (SPICE) is a remote
display protocol for virtual environments. SPICE users can access a virtualized
desktop or server from the local system or any system with network access to the
server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests
running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat
Enterprise Virtualization Hypervisors.

These updated spice-server packages include numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Enterprise Linux 6.5 Technical Notes for information on
the most significant of these changes:

https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/spice-server.html#RHBA-2013-1571

Users of spice-server are advised to upgrade to these updated packages, which
fix these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
spice-server-0.12.4-6.el6.src.rpm
File outdated by:  RHBA-2013:1819
    MD5: 11876a65d61dd01b99b758f6bd901d42
SHA-256: 44fd86cc862f04f52dee7a8a29b13d6535ea8fd8c510d1e1039771f9fc269881
 
x86_64:
spice-server-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 5e3b9ca1f067c4976078231ad81de6e8
SHA-256: a7b05e3f3ceedf745cc53d657fbb1d0d98b363296331e3ffd550c80ab0afc853
spice-server-debuginfo-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 81963c0a90f8271c08e948c13bce8ebb
SHA-256: 60c40609878bb001711ef01c60dc93360a6bc9f772003bceb43d088dd7f2888b
spice-server-devel-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: d30fa05aad123ec7149ddae2672e1bdc
SHA-256: b8fd5c65e2b77725676bf5b3421226fd8191106c3d9a32cf5c1aabf334fdeebd
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
spice-server-0.12.4-6.el6.src.rpm
File outdated by:  RHBA-2013:1819
    MD5: 11876a65d61dd01b99b758f6bd901d42
SHA-256: 44fd86cc862f04f52dee7a8a29b13d6535ea8fd8c510d1e1039771f9fc269881
 
x86_64:
spice-server-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 5e3b9ca1f067c4976078231ad81de6e8
SHA-256: a7b05e3f3ceedf745cc53d657fbb1d0d98b363296331e3ffd550c80ab0afc853
spice-server-debuginfo-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 81963c0a90f8271c08e948c13bce8ebb
SHA-256: 60c40609878bb001711ef01c60dc93360a6bc9f772003bceb43d088dd7f2888b
spice-server-devel-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: d30fa05aad123ec7149ddae2672e1bdc
SHA-256: b8fd5c65e2b77725676bf5b3421226fd8191106c3d9a32cf5c1aabf334fdeebd
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
spice-server-0.12.4-6.el6.src.rpm
File outdated by:  RHBA-2013:1819
    MD5: 11876a65d61dd01b99b758f6bd901d42
SHA-256: 44fd86cc862f04f52dee7a8a29b13d6535ea8fd8c510d1e1039771f9fc269881
 
x86_64:
spice-server-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 5e3b9ca1f067c4976078231ad81de6e8
SHA-256: a7b05e3f3ceedf745cc53d657fbb1d0d98b363296331e3ffd550c80ab0afc853
spice-server-debuginfo-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 81963c0a90f8271c08e948c13bce8ebb
SHA-256: 60c40609878bb001711ef01c60dc93360a6bc9f772003bceb43d088dd7f2888b
spice-server-devel-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: d30fa05aad123ec7149ddae2672e1bdc
SHA-256: b8fd5c65e2b77725676bf5b3421226fd8191106c3d9a32cf5c1aabf334fdeebd
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
spice-server-0.12.4-6.el6.src.rpm
File outdated by:  RHBA-2013:1819
    MD5: 11876a65d61dd01b99b758f6bd901d42
SHA-256: 44fd86cc862f04f52dee7a8a29b13d6535ea8fd8c510d1e1039771f9fc269881
 
x86_64:
spice-server-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 5e3b9ca1f067c4976078231ad81de6e8
SHA-256: a7b05e3f3ceedf745cc53d657fbb1d0d98b363296331e3ffd550c80ab0afc853
spice-server-debuginfo-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: 81963c0a90f8271c08e948c13bce8ebb
SHA-256: 60c40609878bb001711ef01c60dc93360a6bc9f772003bceb43d088dd7f2888b
spice-server-devel-0.12.4-6.el6.x86_64.rpm
File outdated by:  RHBA-2013:1819
    MD5: d30fa05aad123ec7149ddae2672e1bdc
SHA-256: b8fd5c65e2b77725676bf5b3421226fd8191106c3d9a32cf5c1aabf334fdeebd
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

823472 - assertion failure with es1370 device and spice-server
859027 - repeated client_migrate_info caused freeing invalid pointer, followed ultimately by segfault in _int_malloc
918169 - Closing window while playing video causes VM to crash
918472 - [abrt] qemu-kvm-0.12.1.2-2.355.el6: getnameinfo: Process /usr/libexec/qemu-kvm was killed by signal 11 (SIGSEGV)
950029 - video streaming during migration might result in destination aborting
952666 - RHEL-7/F-19 does not work on 6.4 qemu-kvm + spice: assert "red_create_surface: Untested path stride >= 0" failed
952671 - Rebase spice-server to latest upstream
956345 - Spice server aborts after 2 seamless migration
958276 - videos without audio might not be played after migration (till client reconnects)
961848 - RFE: add support for filtering out agent file transfer messages
977998 - freezed display when jpeg compression enabled (over WAN)
978403 - [RFE] adaptive video streaming
995041 - timeout duration for waiting for a client response is too long (when flushing commands)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/