- Issued:
- 2010-07-27
- Updated:
- 2010-07-27
RHBA-2010:0563 - Bug Fix Advisory
Synopsis
vnc bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vnc packages that fix various bugs are now available.
Description
Virtual Network Computing (VNC) is a remote display system which
allows you to view a computing 'desktop' environment not only on the
machine where it is running, but from anywhere on the Internet and
from a wide variety of machine architectures.
These updated vnc packages resolve the following issues:
- libvnc.so module to Xorg wasn't able to wake up the main Xorg process when
entered to the DPMS standby mode. Now, when libvnc.so receives keyboard or mouse
event over network, it wakes up the Xorg and turns down running screensaver.
(BZ#607566)
- the VNC server script didn't accept +option switches when specified before
[:X] display number. This issue is now resolved. (BZ#607567)
All VNC Users are advised to upgrade to these updated VNC packages, which
resolve those issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 607566 - vnc.so : VNC viewer blocked when dpms becomes active on the server side.
- BZ - 607567 - vncserver does not accept Xvnc switch
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
x86_64 | |
vnc-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 1c546094bb3d5d5e782a683405ae607d88af436801732cd7cb64ef8031193362 |
vnc-server-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 07a0ffc71735b2b8cd3732c6ac12482479a9799fabca8580138264fa47b0d9ca |
ia64 | |
vnc-4.1.2-14.el5_5.4.ia64.rpm | SHA-256: ad26a106233b83b0a5ddc139a05421de7b767f3b15d24c26b2cda739c3a4c6ce |
vnc-server-4.1.2-14.el5_5.4.ia64.rpm | SHA-256: 0ec0997d86b2d6653f19d6fa65525f9592795062be57b4b74d4533926c9f723f |
i386 | |
vnc-4.1.2-14.el5_5.4.i386.rpm | SHA-256: e5b7f886778d31d72ac9db3dc8e650895f2964e0331a679b8597d08e1d95bafe |
vnc-server-4.1.2-14.el5_5.4.i386.rpm | SHA-256: 5cc57b633bc0e53c82fb7b00a5df961397f70ad464da6b3a74270f5f55eb8937 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
x86_64 | |
vnc-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 1c546094bb3d5d5e782a683405ae607d88af436801732cd7cb64ef8031193362 |
vnc-server-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 07a0ffc71735b2b8cd3732c6ac12482479a9799fabca8580138264fa47b0d9ca |
i386 | |
vnc-4.1.2-14.el5_5.4.i386.rpm | SHA-256: e5b7f886778d31d72ac9db3dc8e650895f2964e0331a679b8597d08e1d95bafe |
vnc-server-4.1.2-14.el5_5.4.i386.rpm | SHA-256: 5cc57b633bc0e53c82fb7b00a5df961397f70ad464da6b3a74270f5f55eb8937 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
x86_64 | |
vnc-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 1c546094bb3d5d5e782a683405ae607d88af436801732cd7cb64ef8031193362 |
vnc-server-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 07a0ffc71735b2b8cd3732c6ac12482479a9799fabca8580138264fa47b0d9ca |
i386 | |
vnc-4.1.2-14.el5_5.4.i386.rpm | SHA-256: e5b7f886778d31d72ac9db3dc8e650895f2964e0331a679b8597d08e1d95bafe |
vnc-server-4.1.2-14.el5_5.4.i386.rpm | SHA-256: 5cc57b633bc0e53c82fb7b00a5df961397f70ad464da6b3a74270f5f55eb8937 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
s390x | |
vnc-4.1.2-14.el5_5.4.s390x.rpm | SHA-256: 114abee576a744e8de0a208d153dc5ee895a7a1c0f2d5aecbaf61a398879c82c |
vnc-server-4.1.2-14.el5_5.4.s390x.rpm | SHA-256: 089163b38ca7895bea98fc7421655a0ead356e8df3678e13440fd74d274c0255 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
ppc | |
vnc-4.1.2-14.el5_5.4.ppc.rpm | SHA-256: 15cf9b9077871f4bbf381bdb4ac860f3978d795ce05d60eb9c6218ba836d4540 |
vnc-server-4.1.2-14.el5_5.4.ppc.rpm | SHA-256: 621577c09529ccd0e41cfa3cf58a93d5186803b1e284b426af2a82e80dcff3c5 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
vnc-4.1.2-14.el5_5.4.src.rpm | SHA-256: 839262c6a8e30e8f74e6d53cdf5ffc7c223bdd16166ef64779d655895e1fdffc |
x86_64 | |
vnc-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 1c546094bb3d5d5e782a683405ae607d88af436801732cd7cb64ef8031193362 |
vnc-server-4.1.2-14.el5_5.4.x86_64.rpm | SHA-256: 07a0ffc71735b2b8cd3732c6ac12482479a9799fabca8580138264fa47b0d9ca |
i386 | |
vnc-4.1.2-14.el5_5.4.i386.rpm | SHA-256: e5b7f886778d31d72ac9db3dc8e650895f2964e0331a679b8597d08e1d95bafe |
vnc-server-4.1.2-14.el5_5.4.i386.rpm | SHA-256: 5cc57b633bc0e53c82fb7b00a5df961397f70ad464da6b3a74270f5f55eb8937 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.