- Issued:
- 2010-07-30
- Updated:
- 2010-07-30
RHBA-2010:0579 - Bug Fix Advisory
Synopsis
qspice bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated qspice packages that fix a bug are now available.
Description
The Simple Protocol for Independent Computing Environments (SPICE) is a remote
display protocol used in Red Hat Enterprise Linux for viewing virtualized guests
running on the KVM hypervisor, or on Red Hat Enterprise Virtualization
Hypervisor.
These updated qspice packages fix the following bug:
- after a live migration of a virtual machine with multiple monitors, not being
reset properly at the client side, the palette cache was not always synchronized
between the server and the client, which could cause the client to terminate
unexpectedly. With this update, the target server always sends the "RESET"
instruction to the client for all monitors, and the client now works as
expected. (BZ#609582)
Users requiring remote display capabilities for KVM hypervisors are advised to
upgrade to these updated qspice packages, which resolve the above issue.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Workstation 5 x86_64
Fixes
- BZ - 609582 - SPICE: Client connected to win7-X64 Guest crashed on migration.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
qspice-0.3.0-54.el5_5.1.src.rpm | SHA-256: 023836b06a5b2163fe1ae730ace656feff0a1467af9df6dc70c9b3d867e642c6 |
x86_64 | |
qspice-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: a4936f696d9cca85218552eca9233b8dac5fd9abb45398bd4e60a5c3e5bca6fc |
qspice-libs-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: e57a7d55a224048181066484938cad0f92864ee4267a0ff07798c480200b16c7 |
qspice-libs-devel-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: 2e4c7a50e20f6d17b0862ef802b7f8cf858b4f7d23b2a452a880580a282ce839 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
qspice-0.3.0-54.el5_5.1.src.rpm | SHA-256: 023836b06a5b2163fe1ae730ace656feff0a1467af9df6dc70c9b3d867e642c6 |
x86_64 | |
qspice-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: a4936f696d9cca85218552eca9233b8dac5fd9abb45398bd4e60a5c3e5bca6fc |
qspice-libs-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: e57a7d55a224048181066484938cad0f92864ee4267a0ff07798c480200b16c7 |
qspice-libs-devel-0.3.0-54.el5_5.1.x86_64.rpm | SHA-256: 2e4c7a50e20f6d17b0862ef802b7f8cf858b4f7d23b2a452a880580a282ce839 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.