- Issued:
- 2011-12-06
- Updated:
- 2011-12-06
RHEA-2011:1629 - Product Enhancement Advisory
Synopsis
spice-protocol bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated spice-protocol package that fixes one bug and adds several
enhancements is now available for Red Hat Enterprise Linux 6.
Description
The spice-protocol package contains header files that describe the SPICE
protocol and the QXL para-virtualized graphics card. The SPICE protocol is
needed to build newer versions of the spice-client and the spice-server
packages.
- The spice-protocol package has been upgraded to upstream version 0.8.1, which
provides a number of enhancements over the previous version, including support
for asynchronous guest I/O operations, support for suspending guest I/O
operations, and support for changing guest volume. (BZ#723480)
In addition, this update fixes the following bug:
- The SPICE client failed to connect to the SPICE server on the target host
after a virtual machine had been migrated to a remote machine. This happened
when the migration of the virtual machine took longer than the expiration time
of the SPICE ticket that was set on the target host. Without a valid password,
the SPICE server refused connection from the SPICE client and the SPICE session
had to be closed. To prevent this problem, support for spice semi-seamless
migration has been added. Other components such as spice-client, spice-server
and qemu-kvm have also been modified to support this feature. SPICE now allows
the SPICE client to connect to the SPICE server on the target host at the very
start of the virtual machine migration, just before the migrate monitor command
is given to the qemu-kvm application. With a valid ticket on the target host,
the SPICE ticket on the destination no longer expires and the SPICE client now
remains open when the virtual machine migration is done. (BZ#738262)
All users of spice-protocol are advised to upgrade to this updated package,
which fixes this bug and adds these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 723480 - spice-protocol: update to upstream 0.8.1
- BZ - 738262 - spice-protocol: semi-seamless migration support
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
i386 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
i386 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
i386 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
i386 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
i386 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
spice-protocol-0.8.1-2.el6.src.rpm | SHA-256: 61ccf8d4464ac26a24fe429d6be37816b81454829aae2eb31858a2d380cb4daa |
x86_64 | |
spice-protocol-0.8.1-2.el6.noarch.rpm | SHA-256: 91ea3b57f69aace381a1e52fd4f285bf5508c35147c3e53a1cc8495de7c48509 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.