- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1301 - Bug Fix Advisory
Synopsis
gtk-vnc bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gtk-vnc package that fixes several bugs is now available.
Description
gtk-vnc is a VNC viewer widget for GTK. It is built using co-routines
allowing it to be completely asynchronous while remaining single threaded.
This update addresses the following issues:
- the handling of the virtual mouse pointer could result in the pointer
getting stuck against an invisible wall, unable to move into some areas of
the virtual machine display area. (BZ#487560)
- handling of non-US layout keyboards had flaws making it impossible to
type certain key sequences, for example Shift+Tab. (BZ#357491)
- the gtk-vnc package was re-based to version 0.3.8, from version 0.3.2, to
address problems with virtual mouse pointer movement handling and the
conversion of "keysyms" for non-US layout keyboards. The update also
improves interoperability with VNC servers and extensions. (BZ#489326)
All gtk-vnc users should install this updated package which addresses these
issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 357491 - [5.2] <Shift> + <Tab> is unusable keyboard shortcut for HVM guest domain
- BZ - 487560 - Broken handling of relative mouse grab mode
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
gtk-vnc-0.3.8-3.el5.src.rpm | SHA-256: 35db01df10c08094e7ce8c07e7927184958862662569be95fe8257c485897272 |
x86_64 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-0.3.8-3.el5.x86_64.rpm | SHA-256: 3893702173ee707a49f610393516353c5653050cd3c93d08cd6c92c2d6b5a307 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-devel-0.3.8-3.el5.x86_64.rpm | SHA-256: 9804821cdb872c284ed975d32e937bef4438d864eaa147f45215c1636384ce54 |
gtk-vnc-python-0.3.8-3.el5.x86_64.rpm | SHA-256: 17fdbdf12e9b0dae5ef4f0deb179ce7f12ae49d9b56f00be13d78df4ec5310fa |
ia64 | |
gtk-vnc-0.3.8-3.el5.ia64.rpm | SHA-256: 8a51abe9bc673f4e1d09454403307fd66d77659048971c6db6b3e9e22a392a9f |
gtk-vnc-devel-0.3.8-3.el5.ia64.rpm | SHA-256: 5fc337b41e3e8f4d74e68b5d77b1e68507c5a47645fb54f7bd5a77d9039555b4 |
gtk-vnc-python-0.3.8-3.el5.ia64.rpm | SHA-256: 2cad6e68da21b4ee9420d0e3cb19d7dfa0b92953747cfe062032ed6bccacb4c4 |
i386 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-python-0.3.8-3.el5.i386.rpm | SHA-256: 9145f1641755a9c470c42e5263b32b2c8ea472e532f5052b325966fc821b370e |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
gtk-vnc-0.3.8-3.el5.src.rpm | SHA-256: 35db01df10c08094e7ce8c07e7927184958862662569be95fe8257c485897272 |
x86_64 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-0.3.8-3.el5.x86_64.rpm | SHA-256: 3893702173ee707a49f610393516353c5653050cd3c93d08cd6c92c2d6b5a307 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-devel-0.3.8-3.el5.x86_64.rpm | SHA-256: 9804821cdb872c284ed975d32e937bef4438d864eaa147f45215c1636384ce54 |
gtk-vnc-python-0.3.8-3.el5.x86_64.rpm | SHA-256: 17fdbdf12e9b0dae5ef4f0deb179ce7f12ae49d9b56f00be13d78df4ec5310fa |
i386 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-python-0.3.8-3.el5.i386.rpm | SHA-256: 9145f1641755a9c470c42e5263b32b2c8ea472e532f5052b325966fc821b370e |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
gtk-vnc-0.3.8-3.el5.src.rpm | SHA-256: 35db01df10c08094e7ce8c07e7927184958862662569be95fe8257c485897272 |
x86_64 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-0.3.8-3.el5.x86_64.rpm | SHA-256: 3893702173ee707a49f610393516353c5653050cd3c93d08cd6c92c2d6b5a307 |
gtk-vnc-python-0.3.8-3.el5.x86_64.rpm | SHA-256: 17fdbdf12e9b0dae5ef4f0deb179ce7f12ae49d9b56f00be13d78df4ec5310fa |
i386 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-python-0.3.8-3.el5.i386.rpm | SHA-256: 9145f1641755a9c470c42e5263b32b2c8ea472e532f5052b325966fc821b370e |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
gtk-vnc-0.3.8-3.el5.src.rpm | SHA-256: 35db01df10c08094e7ce8c07e7927184958862662569be95fe8257c485897272 |
x86_64 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-0.3.8-3.el5.x86_64.rpm | SHA-256: 3893702173ee707a49f610393516353c5653050cd3c93d08cd6c92c2d6b5a307 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-devel-0.3.8-3.el5.x86_64.rpm | SHA-256: 9804821cdb872c284ed975d32e937bef4438d864eaa147f45215c1636384ce54 |
gtk-vnc-python-0.3.8-3.el5.x86_64.rpm | SHA-256: 17fdbdf12e9b0dae5ef4f0deb179ce7f12ae49d9b56f00be13d78df4ec5310fa |
i386 | |
gtk-vnc-0.3.8-3.el5.i386.rpm | SHA-256: beb72572debd047d30f28571838a542a9304fa9659f681da67f2894b648a9e48 |
gtk-vnc-devel-0.3.8-3.el5.i386.rpm | SHA-256: ce6008b37ec70c9b384c90986bcfa1318f7906fc58f7c099bff6bb5e572c598b |
gtk-vnc-python-0.3.8-3.el5.i386.rpm | SHA-256: 9145f1641755a9c470c42e5263b32b2c8ea472e532f5052b325966fc821b370e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.