An update for spice is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The Simple Protocol for Independent Computing Environments (SPICE) is a remotedisplay system built for virtual environments which allows the user to view acomputing ‘desktop’ environment not only on the machine where it is running, butfrom anywhere on the Internet and from a wide variety of machine architectures.Security Fix(es):* A memory allocation flaw, leading to a heap-based buffer overflow, was foundin spice’s smartcard interaction, which runs under the QEMU-KVM context on thehost.

A user connecting to a guest VM using spice could potentially use thisflaw to crash the QEMU-KVM process or execute arbitrary code with the privilegesof the host’s QEMU-KVM process. (CVE-2016-0749)* A memory access flaw was found in the way spice handled certain guests usingcrafted primary surface parameters.

A user in a guest could use this flaw toread from and write to arbitrary memory locations on the host. (CVE-2016-2150)The CVE-2016-0749 issue was discovered by Jing Zhao (Red Hat) and theCVE-2016-2150 issue was discovered by Frediano Ziglio (Red Hat).
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258Applications acting as a SPICE server must be restarted for this update to takeeffect. Note that QEMU-KVM guests providing SPICE console access must berestarted for this update to take effect.Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
spice-0.12.4-15.el7_2.1.src.rpm
    MD5: fa498221bcac8a0b6d7f5750b4d6106cSHA-256: 7f7d26048b3d202b50a0405b7de2cf51b4f0b25645723ff86b2484d381faf001
 
x86_64:
spice-debuginfo-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: a846b173b0662df2d48f7ab38d9f1aa6SHA-256: cfdbf521f6edd70b9f0760eb8ff61c80b9eabcf875a99cb7ea203dd5546dc0f3
spice-server-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 86d5ac6bcf54a6e43b87e41ad875fce0SHA-256: 2456ef2cddf86fc496327c16f5d3784393d19d44c2d1614b97013ee241fd93df
spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
    MD5: 409a3c540f0f025c321ea6f1efff31ebSHA-256: afd2b0a278b7e62ef570c764e8d03cba6d925845e35bae78cd142fb7fffa1e8a
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: