Bug 1140975
Summary: | fail to login spice session with password + expire time | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | chcheng <chcheng> |
Component: | qemu-kvm-rhev | Assignee: | Gerd Hoffmann <kraxel> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.0 | CC: | flang, hhuang, juzhang, marcandre.lureau, mazhang, michen, qzhang, rbalakri, sluo, virt-bugs, virt-maint, xfu |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | qemu-kvm-rhev-2.1.2-6.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | 1138639 | Environment: | |
Last Closed: | 2015-03-05 09:55:13 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1138639 | ||
Bug Blocks: | 1138647 |
Comment 2
Marc-Andre Lureau
2014-10-07 09:46:29 UTC
upstream commit 07d49a53b6394941ed833486a3acb5c480d87db2 backport posted. Fix included in qemu-kvm-rhev-2.1.2-6.el7 Reproduce this bug as follow version: Host: # uname -r 3.10.0-191.el7.x86_64 # rpm -q qemu-kvm-rhev qemu-kvm-rhev-2.1.2-5.el7.x86_64 Guest:rhel7 Steps: 1.Boot guest with "spice port=5932,password=redhat " 2.set password expire time as 1000 sec : .. { "execute": "expire_password", "arguments": { "protocol": "spice", "time": "+60" } } 3.before the password expired, use virt-viewer to connect the guest: #remote-viewer spice://$hostIP:5932 Results: can't login with the correct password although the password is not expired. Verify this bug as follow version: Host: # uname -r 3.10.0-191.el7.x86_64 # rpm -q qemu-kvm-rhev qemu-kvm-rhev-2.1.2-6.el7.x86_64 Steps as same as reproduce Results: can login with the correct password . According to above test ,this bug fixed. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0624.html |