Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:4184 - Security Advisory
Issued:
2020-10-06
Updated:
2020-10-06

RHSA-2020:4184 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: spice and spice-gtk security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for spice and spice-gtk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.

The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

Security Fix(es):

  • spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All applications using SPICE (most notably all QEMU-KVM instances using the SPICE console) must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Fixes

  • BZ - 1868435 - CVE-2020-14355 spice: multiple buffer overflow vulnerabilities in QUIC decoding code

CVEs

  • CVE-2020-14355

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
spice-gtk-0.35-7.el8_0.1.src.rpm SHA-256: e0f4c975cd8efb34b0b7de30dd15e14c5a141e47f0cc6e87f1bb7859694f8473
ppc64le
spice-glib-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 3f653a1908903b6f2926d1842e999ed0ce31780a6ca844b1d1423e5f65b40f38
spice-glib-debuginfo-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 952977a38eb4d11d4bc4c778115c0b8a11586550e8ec5484b956b8e53825493d
spice-glib-devel-0.35-7.el8_0.1.ppc64le.rpm SHA-256: ec61e0aa5499a92daaf723d1976c4eec90003106839f48379a0db0a365f1dfed
spice-gtk-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 5f5de3db8378030e5eb88a0ca0fb146e38ba669c0d610ac946d3b58439cbcfd8
spice-gtk-debuginfo-0.35-7.el8_0.1.ppc64le.rpm SHA-256: c09e61f64fb40b60c4d565881eb193b5704828d0ce54e4c5318ca4aab8394df0
spice-gtk-debugsource-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 4d8c77690eb07632c6c76228ab2bfc3cfae1f26bc56101c2d3e45d70ce988980
spice-gtk-tools-0.35-7.el8_0.1.ppc64le.rpm SHA-256: f166cb55b734258caa900976957d7c8f05dff03bc143ec69046156efb45852f5
spice-gtk-tools-debuginfo-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 4614c7fd56bdf6b47328b4bb4fac9e72ffb224b13de23cf9d83aa6b15ca0cbbb
spice-gtk3-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 1f23fa11b397e32385f785a909e48cd718853329a61622f9d2a05c985f68f07c
spice-gtk3-debuginfo-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 8157a38cb30864d070c801fdf4d8fc7906605df6d20fd957aae9927aaa0c4f7a
spice-gtk3-devel-0.35-7.el8_0.1.ppc64le.rpm SHA-256: cad8400b4b292c64c17751ab2558a2e53851a0ac58a90c2f1aaeb14b49d72a27
spice-gtk3-vala-0.35-7.el8_0.1.ppc64le.rpm SHA-256: 75c51801f75a8623fcd70542c36c3e36823b5d9b4b86b122c92fae0c4d552a88

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
spice-0.14.0-7.el8_0.1.src.rpm SHA-256: 9c1df108925419dd732e8341f3ef0ced08dcfcd6b060f31d0ff06425b7549a88
spice-gtk-0.35-7.el8_0.1.src.rpm SHA-256: e0f4c975cd8efb34b0b7de30dd15e14c5a141e47f0cc6e87f1bb7859694f8473
x86_64
spice-debugsource-0.14.0-7.el8_0.1.i686.rpm SHA-256: 65c935466e12b3f4abfeb51a4a6714d92ffb1dd906c1b39169da37ada8b2b968
spice-debugsource-0.14.0-7.el8_0.1.x86_64.rpm SHA-256: b05cb291221fd7f97fbb76c39bdf912f5f2e7a8006f0811dda1219863ccfe6d0
spice-glib-0.35-7.el8_0.1.i686.rpm SHA-256: 7d5927119a92374897b04ceb0af7f78d2a9f509aa169152224fb3001acc3d58f
spice-glib-0.35-7.el8_0.1.x86_64.rpm SHA-256: 4d25f5fdf829bde27b58e11d2430c901be66b8a72231297cad90f3c8fbf2c5d3
spice-glib-debuginfo-0.35-7.el8_0.1.i686.rpm SHA-256: e26dcb02511e2951ae743f1d1a4c955b952102e88d63200b301de72b6628abfd
spice-glib-debuginfo-0.35-7.el8_0.1.x86_64.rpm SHA-256: d374704d14e3dc8cab89f1224e4930e690294f3ffac7cf2760178983f3fddd19
spice-glib-devel-0.35-7.el8_0.1.i686.rpm SHA-256: d41036e184745f4bc41820f4dc31fa9a690808bc298f76884c4f91722b76af8e
spice-glib-devel-0.35-7.el8_0.1.x86_64.rpm SHA-256: 58735e407fdb9bcc962997d83244eef99aac4da1c9aa9af88328fbe7e3d6e7d1
spice-gtk-0.35-7.el8_0.1.x86_64.rpm SHA-256: 7fbcee3c7a1a15484303276ff739f837eccdacdefac6bf3fede6efd0a175a3a5
spice-gtk-debuginfo-0.35-7.el8_0.1.i686.rpm SHA-256: 483b1b8327615997295ba82bd4a7af7653dd7a16fb2fb0b14a3c1672c0813696
spice-gtk-debuginfo-0.35-7.el8_0.1.x86_64.rpm SHA-256: 39c8957797aef2ee3ef3e0a2a90773dceae4b6f448056c2b30617ce18d4a3e71
spice-gtk-debugsource-0.35-7.el8_0.1.i686.rpm SHA-256: 295e9e365efc9583b2cb91d266310c6ce208d2bc0f27184b048380dd5dafdc06
spice-gtk-debugsource-0.35-7.el8_0.1.x86_64.rpm SHA-256: f74230a49fe6464bad22c77b6edd6d57ffb68f8209d4c10e5169e332896ff46b
spice-gtk-tools-0.35-7.el8_0.1.x86_64.rpm SHA-256: 724ea1e31b6749cffba5996a2df81fffcd854c5a9094d3fa6eecffcaa52c7486
spice-gtk-tools-debuginfo-0.35-7.el8_0.1.i686.rpm SHA-256: 0010100ade1af0ae1404fca673ccfbe278a89b8cabb9a9fbc084ebcbb355a54c
spice-gtk-tools-debuginfo-0.35-7.el8_0.1.x86_64.rpm SHA-256: d25fde1e22e4d5a2f0776676ab62b59e2961a3760f8acc0f56e2a9a63171c15e
spice-gtk3-0.35-7.el8_0.1.i686.rpm SHA-256: 626181ac423c6ce15346062aa163d26866503ffc70d30527518bc635d0dac852
spice-gtk3-0.35-7.el8_0.1.x86_64.rpm SHA-256: c972b494d2f7e12d7a146da242ddb8fd6fc0216c427820abe914d694abf2c5f5
spice-gtk3-debuginfo-0.35-7.el8_0.1.i686.rpm SHA-256: 8437768db6d253a5b1f2261eb9fa47fc762ad2d473a20886264787e942f261dc
spice-gtk3-debuginfo-0.35-7.el8_0.1.x86_64.rpm SHA-256: cd6abc2122413548d542c6d8eecac2b48a5297e349dc1cf7660830d0bbce45b0
spice-gtk3-devel-0.35-7.el8_0.1.i686.rpm SHA-256: 890e8df04438e6d363ce964fdbf4a24d55c8cd08eaaa76502805a4ba687d5ace
spice-gtk3-devel-0.35-7.el8_0.1.x86_64.rpm SHA-256: edade6ebb39ad66016a0ce5e3f957ccf6b0a353c6b4feb990e9e4570bde7ebdf
spice-gtk3-vala-0.35-7.el8_0.1.x86_64.rpm SHA-256: e1f0ce3c1b8f9a4b056ec8d53201065ccc7596da2782ceea71072fc7049436eb
spice-server-0.14.0-7.el8_0.1.i686.rpm SHA-256: cebf6663c003dd8bf7a5ad384baf974ba772b3d38242aa07fe583eb4ce6b284f
spice-server-0.14.0-7.el8_0.1.x86_64.rpm SHA-256: 2c7b8b3cb9935c5723cea90e60af7a8fe9d402f75b90b68dc819cd480a9f4195
spice-server-debuginfo-0.14.0-7.el8_0.1.i686.rpm SHA-256: 547ba7531a5da84b4f6cab429ba5335da49a310705c166bbf4b386d483287f60
spice-server-debuginfo-0.14.0-7.el8_0.1.x86_64.rpm SHA-256: be462513897f7f05b058b10916c2b4f44079cb024f14f205ed6eb71768d7e62b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility