Bug 527723

Summary: SPICE - if configured with SSL, it'll open SSL with DEFLATE compression
Product: Red Hat Enterprise Linux 5 Reporter: RHEL Program Management <pm-rhel>
Component: qspiceAssignee: Uri Lublin <uril>
Status: CLOSED ERRATA QA Contact: yeylon <yeylon>
Severity: medium Docs Contact:
Priority: medium    
Version: 5.5CC: cpelland, lnatapov, ovirt-maint, pm-eus, Rhev-m-bugs, rluxenbe, rtamir, srevivo, syeghiay, uril, virt-maint, yeylon, ykamay, ykaul
Target Milestone: rcKeywords: Reopened, ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://mantis.tlv.redhat.com/view.php?id=4294
Whiteboard: VDI
Fixed In Version: qspice-0.3.0-39.el5_4.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-10-08 14:45:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 482111    
Bug Blocks:    
Attachments:
Description Flags
spice: server: disable ssl compression none

Description RHEL Program Management 2009-10-07 13:49:51 UTC
This bug has been copied from bug #482111 and has been proposed
to be backported to 5.4 z-stream (EUS).

Comment 3 Uri Lublin 2009-10-07 14:11:23 UTC
Created attachment 363971 [details]
spice: server: disable ssl compression

Exact same patch that fixed rhbz# 482111

Comment 5 Leonid Natapov 2009-10-08 11:22:29 UTC
Replaced qspice libraries (4.2) with a new qspice libraries (4.3)
No SSL compression.

qspice-0.3.0-39.el5_4.3.x86_64.rpm (info) (download)  
qspice-libs-0.3.0-39.el5_4.3.x86_64.rpm (info) (download)  
qspice-debuginfo-0.3.0-39.el5_4.3.x86_64.rpm (info) (download

Comment 7 errata-xmlrpc 2009-10-08 14:45:23 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2009-1489.html