Skip to navigation

Bug Fix Advisory spice-server bug fix update

Advisory: RHBA-2013:1819-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-12-11
Last updated on: 2014-01-16
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated spice-server packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The Simple Protocol for Independent Computing Environments (SPICE) is a remote
display protocol for virtual environments. SPICE users can access a virtualized
desktop or server from the local system or any system with network access to the
server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests
running on the Kernel-based Virtual Machine (KVM) hypervisor or on Red Hat
Enterprise Virtualization Hypervisors.

* Previously, the SPICE server assumed that the client was connected until they
got disconnected. When the SPICE client became unresponsive, the server
continued trying to communicate with it. Consequently, queues (such as driver
commands ring) filled up, and the guest display driver continued waiting. With
this update, the SPICE server monitors if the client is responsive, and
disconnects if it is not. (BZ#1027244)

Users of spice-server are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
spice-server-0.12.4-6.el6_5.1.src.rpm     MD5: 523cebd81de23c0c1578ad89b31acc55
SHA-256: cd00b95f2bdb7c729d5760c95fe0beb58d00879eaae275f2684bd0075c4ca763
 
x86_64:
spice-server-0.12.4-6.el6_5.1.x86_64.rpm     MD5: ce6e59b8674c76c9f60748663864a464
SHA-256: 96b2488602244739f215f30ad2087a34fe48c5fc73e8e9940af491fe4d5c1b70
spice-server-debuginfo-0.12.4-6.el6_5.1.x86_64.rpm     MD5: e79e67570231211ce2da96decf6d5a80
SHA-256: c9a0e165e91d68b153ecbe8e1eb24bd446abe4874dbf7471969a42c5bfaff25b
spice-server-devel-0.12.4-6.el6_5.1.x86_64.rpm     MD5: c6311ddc65d85034215f5caaf2a2a43b
SHA-256: 7003ef8ff962ab8bea93a3cd4e6c4655978f96c9cdf1366a1207082886aff5d1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1027244 - spice server doesn't recognize client disconnection when client disconnects ungracefully


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/