- Issued:
- 2007-05-01
- Updated:
- 2007-05-01
RHBA-2007:0219 - Bug Fix Advisory
Synopsis
vte bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vte packages that fixes various issues are now available.
Description
VTE is an experimental terminal emulator widget for use with GTK+ 2.0.
When using VTE with some applications like ispell or nano, rendering
artifacts could occur. With this bug fix, several such issues are fixed.
Certain East Asian applications had problems with some double-width
characters when run under East Asian UTF-8 locales (as opposed to
non-UTF-8 locales).
To fix this, the VTE_CJK_WIDTH environment variable can be set when
running vte or gnome-terminal, to get behavior that better matches
non-UTF-8 East Asian locales.
However, this has a negative effect on some other applications that use
box-drawing characters. Consequently, the VTE_CJK_WIDTH environment
variable is not enabled by default. (Note that gnome-terminal should be
run with the --disable-factory option to run as a new process and not
attach to an existing process.)
Previously, when the terminal process was killed, it left uncleaned
utmp/wtmp records behind. This is fixed now.
Users should upgrade to these updated packages, which resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 165193 - [RHEL-4] gnome-pty-helper doesn't clean up gnome-terminals' utmp/wtmp entries when killed
- BZ - 184596 - artifacts when running with TERM=xterm and ispell
- BZ - 186464 - nano scrolling distortion
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
vte-0.11.11-11.el4.src.rpm | SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529 |
x86_64 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.x86_64.rpm | SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766 |
vte-0.11.11-11.el4.x86_64.rpm | SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766 |
vte-devel-0.11.11-11.el4.x86_64.rpm | SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa |
vte-devel-0.11.11-11.el4.x86_64.rpm | SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa |
ia64 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.ia64.rpm | SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236 |
vte-0.11.11-11.el4.ia64.rpm | SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236 |
vte-devel-0.11.11-11.el4.ia64.rpm | SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a |
vte-devel-0.11.11-11.el4.ia64.rpm | SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a |
i386 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-devel-0.11.11-11.el4.i386.rpm | SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba |
vte-devel-0.11.11-11.el4.i386.rpm | SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
vte-0.11.11-11.el4.src.rpm | SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529 |
x86_64 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.x86_64.rpm | SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766 |
vte-devel-0.11.11-11.el4.x86_64.rpm | SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa |
ia64 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.ia64.rpm | SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236 |
vte-devel-0.11.11-11.el4.ia64.rpm | SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a |
i386 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-devel-0.11.11-11.el4.i386.rpm | SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
vte-0.11.11-11.el4.src.rpm | SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529 |
x86_64 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-0.11.11-11.el4.x86_64.rpm | SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766 |
vte-devel-0.11.11-11.el4.x86_64.rpm | SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa |
i386 | |
vte-0.11.11-11.el4.i386.rpm | SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab |
vte-devel-0.11.11-11.el4.i386.rpm | SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
vte-0.11.11-11.el4.src.rpm | SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529 |
s390x | |
vte-0.11.11-11.el4.s390.rpm | SHA-256: 1a248c8a01c1dc8290f06a497055fd4f020c3d6ec84cf8f502db12821454ba49 |
vte-0.11.11-11.el4.s390x.rpm | SHA-256: 71a9cd1df7905da57c9c6f166475b7521590e0a3e7740a11ba93440ea7916903 |
vte-devel-0.11.11-11.el4.s390x.rpm | SHA-256: 6153ffce2ad07c3f736e173b9f2c9ba3760a785d8e41d1b3f97e373331e49dc6 |
s390 | |
vte-0.11.11-11.el4.s390.rpm | SHA-256: 1a248c8a01c1dc8290f06a497055fd4f020c3d6ec84cf8f502db12821454ba49 |
vte-devel-0.11.11-11.el4.s390.rpm | SHA-256: 98ab2abf0bd73585875b64eeeef0a5a931d6e4916abb723462f588064db0d25c |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
vte-0.11.11-11.el4.src.rpm | SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529 |
ppc | |
vte-0.11.11-11.el4.ppc.rpm | SHA-256: 9f1e1ab05f1a148a87eaa05fb03c44b4e0440bc96377a76d2d78ce415f96c582 |
vte-0.11.11-11.el4.ppc64.rpm | SHA-256: 9ada154e543952243876b785a081c8c0cadea6d8ae752c15966eacd9614e6630 |
vte-devel-0.11.11-11.el4.ppc.rpm | SHA-256: 1e87ec25d6aa78e8768861ab530b6db6f4498c84bcccc487f650a8df76ce0280 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.