Skip to navigation

Enhancement Advisory spice-protocol bug fix and enhancement update

Advisory: RHEA-2011:1629-2
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated spice-protocol package that fixes one bug and adds several
enhancements is now available for Red Hat Enterprise Linux 6.

The spice-protocol package contains header files that describe the SPICE
protocol and the QXL para-virtualized graphics card. The SPICE protocol is
needed to build newer versions of the spice-client and the spice-server
packages.

* The spice-protocol package has been upgraded to upstream version 0.8.1, which
provides a number of enhancements over the previous version, including support
for asynchronous guest I/O operations, support for suspending guest I/O
operations, and support for changing guest volume. (BZ#723480)

In addition, this update fixes the following bug:

* The SPICE client failed to connect to the SPICE server on the target host
after a virtual machine had been migrated to a remote machine. This happened
when the migration of the virtual machine took longer than the expiration time
of the SPICE ticket that was set on the target host. Without a valid password,
the SPICE server refused connection from the SPICE client and the SPICE session
had to be closed. To prevent this problem, support for spice semi-seamless
migration has been added. Other components such as spice-client, spice-server
and qemu-kvm have also been modified to support this feature. SPICE now allows
the SPICE client to connect to the SPICE server on the target host at the very
start of the virtual machine migration, just before the migrate monitor command
is given to the qemu-kvm application. With a valid ticket on the target host,
the SPICE ticket on the destination no longer expires and the SPICE client now
remains open when the virtual machine migration is done. (BZ#738262)

All users of spice-protocol are advised to upgrade to this updated package,
which fixes this bug and adds these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
spice-protocol-0.8.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1573
    MD5: 90a15bd7fb9d98cb55e825f5c4486483
SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa
 
IA-32:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
x86_64:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
spice-protocol-0.8.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1573
    MD5: 90a15bd7fb9d98cb55e825f5c4486483
SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa
 
x86_64:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
spice-protocol-0.8.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1573
    MD5: 90a15bd7fb9d98cb55e825f5c4486483
SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa
 
IA-32:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
x86_64:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
spice-protocol-0.8.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1573
    MD5: 90a15bd7fb9d98cb55e825f5c4486483
SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa
 
IA-32:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
x86_64:
spice-protocol-0.8.1-2.el6.noarch.rpm
File outdated by:  RHEA-2013:1573
    MD5: 78c3320dfd627496eda4c10d86170049
SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

723480 - spice-protocol: update to upstream 0.8.1
738262 - spice-protocol: semi-seamless migration support



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/