Skip to navigation

Bug Fix Advisory tigervnc bug fix and enhancement update

Advisory: RHBA-2011:0649-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated tigervnc packages that fix several bugs and add an enhancement are now
available.

Virtual Network Computing (VNC) is a remote display system which allows you to
view a computing desktop environment not only on the machine where it is
running, but from anywhere on the Internet and from a wide variety of machine
architectures. TigerVNC is a suite of VNC servers and clients.

These updated tigervnc packages provide fixes for the following bugs:

* Xvnc could become unresponsive and the following error message was shown in
the log: "[mi] EQ overflowing. The server is probably stuck in an infinite
loop.". This was caused by a large number of user input events in the Xvnc event
queue, which were being processed too slowly. With this update, this issue no
longer occurs and the system works as expected. (BZ#588342)

* Prior to this update, Xvnc (the X VNC server; part of the tigervnc package)
did not pass keyboard input to a remote VMware workstation because it did not
take into account types of keyboards which do not have modifier keys. With this
update, Xvnc recognizes all types of keyboards; thus, keyboard input is
correctly passed to remote VMware workstations. (BZ#628054)

* When connecting to a remote machine, the default ".vnc/xstartup" file did not
load the i18n (the default X locale settings) settings from the
"/etc/sysconfig/i18n" file which caused the remotely accessed desktop to always
use the "en_US" locale. With this update, the default ".vnc/xstartup" file loads
the i18n settings and shows the correct locale. (BZ#632530)

* The tigervnc-server package was missing a perl dependency, causing the
"/usr/bin/vncserver" script to fail to run. This update adds the perl dependency
to the tigervnc-server package; thus, the "/usr/bin/vncserver" script runs as
expected. (BZ#634161)

* The Xvnc server randomly refused connections when the reading of the password
file (provided when starting Xvnc with the "-PasswordFile" option) was
interrupted by a signal. With this update, the loading of a password file
continues after an interrupt signal is issued and connections are no longer
refused. (BZ#645755)

In addition, these updated tigervnc packages provide the following enhancement:

* TigerVNC (Xvnc, x0vncserver, the libvnc.so module, and vncviewer) now supports
TLS encryption (using VeNCrypt) which allows TLS encrypted communication between
a server and a viewer. (BZ#653491)

Users are advised to upgrade to these updated tigervnc packages, which resolve
these issues and add this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
tigervnc-1.0.90-0.15.20110314svn4359.el6.src.rpm
File outdated by:  RHBA-2014:0125
    MD5: aa16b5c7a2b3ab8c9596b16a7b3e6273
SHA-256: 61e1f56088dc6c3a0396956734b642e3c719a071b98b26f9fa28a83b48663c93
 
IA-32:
tigervnc-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: f0b935c918274a231de095c72aa2939d
SHA-256: f9be2d6de5d2922ba45cac499b12f93456d42e3cb746ba9c0fcd676cb0def976
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 9d539141f8bd7b6d6e63dd1a6e928d68
SHA-256: db87861aa636a2b9f1e179ce82e288483642a26e9e3e5aeffc5707f527be6a05
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 42df27f43d07bc7dfb1f72693ed16fc4
SHA-256: 48e0512a98cb132ab762bcd37cf560a939d45d7e5b143439e0536bb09c85a377
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 192720376f6dedad0efaeec69c8f2df0
SHA-256: 6342923f932464ff18dfe2910399f1cad94ea44f251bfc5d7b14c08207d419c4
 
x86_64:
tigervnc-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: c99722e54efb769afa28911a70afa1e4
SHA-256: 0cf584a7f960da470716d0f867078080d08cf28b157889a33ea774da862d3aaa
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 67490f0652cef9f6d25f8641e36399e6
SHA-256: 7478c669457708378cb1c823e9db0f5b16be646d926da1f5a7916aad42285423
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 8a15f3b418779fbb8616c5e4c07bb147
SHA-256: b68a45f9745441595ca08a4d074458d55ee2a4dac3c559ee876c7e330aee2e97
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 5061334c8b41810db5bec0c05d16fb0a
SHA-256: 3c6c04260cfdbab272fb99cfd43747f21f79a2f449fe1b294c632afa4e2fc2f9
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
tigervnc-1.0.90-0.15.20110314svn4359.el6.src.rpm
File outdated by:  RHBA-2014:0125
    MD5: aa16b5c7a2b3ab8c9596b16a7b3e6273
SHA-256: 61e1f56088dc6c3a0396956734b642e3c719a071b98b26f9fa28a83b48663c93
 
x86_64:
tigervnc-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: c99722e54efb769afa28911a70afa1e4
SHA-256: 0cf584a7f960da470716d0f867078080d08cf28b157889a33ea774da862d3aaa
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 67490f0652cef9f6d25f8641e36399e6
SHA-256: 7478c669457708378cb1c823e9db0f5b16be646d926da1f5a7916aad42285423
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 8a15f3b418779fbb8616c5e4c07bb147
SHA-256: b68a45f9745441595ca08a4d074458d55ee2a4dac3c559ee876c7e330aee2e97
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 5061334c8b41810db5bec0c05d16fb0a
SHA-256: 3c6c04260cfdbab272fb99cfd43747f21f79a2f449fe1b294c632afa4e2fc2f9
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
tigervnc-1.0.90-0.15.20110314svn4359.el6.src.rpm
File outdated by:  RHBA-2014:0125
    MD5: aa16b5c7a2b3ab8c9596b16a7b3e6273
SHA-256: 61e1f56088dc6c3a0396956734b642e3c719a071b98b26f9fa28a83b48663c93
 
IA-32:
tigervnc-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: f0b935c918274a231de095c72aa2939d
SHA-256: f9be2d6de5d2922ba45cac499b12f93456d42e3cb746ba9c0fcd676cb0def976
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 9d539141f8bd7b6d6e63dd1a6e928d68
SHA-256: db87861aa636a2b9f1e179ce82e288483642a26e9e3e5aeffc5707f527be6a05
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 42df27f43d07bc7dfb1f72693ed16fc4
SHA-256: 48e0512a98cb132ab762bcd37cf560a939d45d7e5b143439e0536bb09c85a377
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 192720376f6dedad0efaeec69c8f2df0
SHA-256: 6342923f932464ff18dfe2910399f1cad94ea44f251bfc5d7b14c08207d419c4
 
PPC:
tigervnc-1.0.90-0.15.20110314svn4359.el6.ppc64.rpm
File outdated by:  RHBA-2014:0125
    MD5: fc575374ead1b504e9509f026eabedf7
SHA-256: ed51b7de45db050e6ccd902edb0b9770683cf2ae294f198fc18ce2ebdfa9f5c6
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.ppc64.rpm
File outdated by:  RHBA-2014:0125
    MD5: fcfeab0bfd52ae1f1ddae39bb580ffff
SHA-256: 61f9c3c24f6bec42b06c2ff84995ee95466842e52712d112eabf3a6e3ff2f2bc
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.ppc64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 262a007c045e07e5973c269895f1f582
SHA-256: 5eb59bfe670c52f5394ba9609fa72c17e22e4cf0fe412acec25defa7ae362888
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.ppc64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 4901ccc7486ea9bfa82dae0c6bb505e9
SHA-256: 34bdb7779004b1ce9473f8fc42c7e3c6eaf6dd0d9c53b811ee9c5773926e27c1
 
s390x:
tigervnc-1.0.90-0.15.20110314svn4359.el6.s390x.rpm
File outdated by:  RHBA-2014:0125
    MD5: 5404ddb4ce4eee6553b219760ef35fc9
SHA-256: a389b33df52c01f8ccf69d8a9ab1b5aa79fbe77a320f137ac8d88c774c026368
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.s390x.rpm
File outdated by:  RHBA-2014:0125
    MD5: 526d8c1b2878cc568bc3c21eaca15b48
SHA-256: d0292ea5c5dbcfdf11b54296dcb6852942202075eb36472698ea1d2190a375ab
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.s390x.rpm
File outdated by:  RHBA-2014:0125
    MD5: 150b8d4be7a9a4d4bf95960f243d8563
SHA-256: c2defd144498a52a530f868288a9bd907e75dc20a812b8f06ae210544bbecb73
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
 
x86_64:
tigervnc-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: c99722e54efb769afa28911a70afa1e4
SHA-256: 0cf584a7f960da470716d0f867078080d08cf28b157889a33ea774da862d3aaa
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 67490f0652cef9f6d25f8641e36399e6
SHA-256: 7478c669457708378cb1c823e9db0f5b16be646d926da1f5a7916aad42285423
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 8a15f3b418779fbb8616c5e4c07bb147
SHA-256: b68a45f9745441595ca08a4d074458d55ee2a4dac3c559ee876c7e330aee2e97
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 5061334c8b41810db5bec0c05d16fb0a
SHA-256: 3c6c04260cfdbab272fb99cfd43747f21f79a2f449fe1b294c632afa4e2fc2f9
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
tigervnc-1.0.90-0.15.20110314svn4359.el6.src.rpm
File outdated by:  RHBA-2014:0125
    MD5: aa16b5c7a2b3ab8c9596b16a7b3e6273
SHA-256: 61e1f56088dc6c3a0396956734b642e3c719a071b98b26f9fa28a83b48663c93
 
IA-32:
tigervnc-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: f0b935c918274a231de095c72aa2939d
SHA-256: f9be2d6de5d2922ba45cac499b12f93456d42e3cb746ba9c0fcd676cb0def976
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 9d539141f8bd7b6d6e63dd1a6e928d68
SHA-256: db87861aa636a2b9f1e179ce82e288483642a26e9e3e5aeffc5707f527be6a05
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 42df27f43d07bc7dfb1f72693ed16fc4
SHA-256: 48e0512a98cb132ab762bcd37cf560a939d45d7e5b143439e0536bb09c85a377
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.i686.rpm
File outdated by:  RHBA-2014:0125
    MD5: 192720376f6dedad0efaeec69c8f2df0
SHA-256: 6342923f932464ff18dfe2910399f1cad94ea44f251bfc5d7b14c08207d419c4
 
x86_64:
tigervnc-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: c99722e54efb769afa28911a70afa1e4
SHA-256: 0cf584a7f960da470716d0f867078080d08cf28b157889a33ea774da862d3aaa
tigervnc-debuginfo-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 67490f0652cef9f6d25f8641e36399e6
SHA-256: 7478c669457708378cb1c823e9db0f5b16be646d926da1f5a7916aad42285423
tigervnc-server-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 8a15f3b418779fbb8616c5e4c07bb147
SHA-256: b68a45f9745441595ca08a4d074458d55ee2a4dac3c559ee876c7e330aee2e97
tigervnc-server-applet-1.0.90-0.15.20110314svn4359.el6.noarch.rpm
File outdated by:  RHBA-2014:0125
    MD5: c202046fe4fb6604848cc282073a56d6
SHA-256: a9ed63e534fe0c271b49990f50042a90c5b0402d36435a883f08891b856b088a
tigervnc-server-module-1.0.90-0.15.20110314svn4359.el6.x86_64.rpm
File outdated by:  RHBA-2014:0125
    MD5: 5061334c8b41810db5bec0c05d16fb0a
SHA-256: 3c6c04260cfdbab272fb99cfd43747f21f79a2f449fe1b294c632afa4e2fc2f9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

628054 - Tiger-vnc server doesn't pass keyboard input to VMware Workstation/Player
632530 - RFE: Add zh (Chinese Simplified) translation to vncviewer
634161 - tigervnc-server is missing dependency on perl
645755 - Xvnc randomly refuses connections because reading the password file is interrupted by SIGALRM
653491 - Update to TigerVNC 1.1.0


Keywords

TLS, vncserver, Xvnc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/