- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0685 - Bug Fix Advisory
Synopsis
vnc bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vnc packages that fix several bugs are now available.
Description
The Virtual Network Computing (VNC) system allows users to access the same
desktop from a wide variety of platforms. These packages include the vnc
client, vnc, and the Xvnc server, vnc-server.
These updated packages fix the following bugs:
- in certain situations, when one or more clients were connected to the
Xvnc server, the Xvnc server ignored keyboard and mouse inputs.
- the Xvnc server could crash if it processed a malformed PCF file.
- the "SProcShmCreatePixmap()" function failed to byte-swap "pid". This
caused problems for certain clients, when the client and server were
running on different endian architectures. An error such as "BadIDChoice
(invalid resource ID chosen for this connection)" may have occurred. As
well, this bug may have caused some programs using Xvnc to crash.
Users of vnc and vnc-server are advised to upgrade to these updated
packages, which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 86158 - ignoring keyboard and mouse inputs
- BZ - 203172 - vncserver PCF handling Integer overflow
- BZ - 203673 - Xvnc: SProcShmCreatePixmap() fails to byte-swap 'pid'
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
vnc-4.0-12.el4.src.rpm | SHA-256: 54b3d6c95e02027d17e74cffc381ce5074667f26bb4dfba2e31fd8f112acc44e |
x86_64 | |
vnc-4.0-12.el4.x86_64.rpm | SHA-256: 2dc99ef6a99817ee2d5bbcec85d4905526acdd266343cdfab23f98d787d24df2 |
vnc-4.0-12.el4.x86_64.rpm | SHA-256: 2dc99ef6a99817ee2d5bbcec85d4905526acdd266343cdfab23f98d787d24df2 |
vnc-server-4.0-12.el4.x86_64.rpm | SHA-256: 477317947ecc77dc495202bbae002e8e1de7efcb131e90da0cfc247ec3574fe0 |
vnc-server-4.0-12.el4.x86_64.rpm | SHA-256: 477317947ecc77dc495202bbae002e8e1de7efcb131e90da0cfc247ec3574fe0 |
ia64 | |
vnc-4.0-12.el4.ia64.rpm | SHA-256: 5dc41022a3ceb1dd4135b27858cfa3029fcb8372bc3ab41f571e7cbf110ef683 |
vnc-4.0-12.el4.ia64.rpm | SHA-256: 5dc41022a3ceb1dd4135b27858cfa3029fcb8372bc3ab41f571e7cbf110ef683 |
vnc-server-4.0-12.el4.ia64.rpm | SHA-256: 3b029eb974e3964532c08617885e7987492b7e52c5ef7bcca74d553074c92813 |
vnc-server-4.0-12.el4.ia64.rpm | SHA-256: 3b029eb974e3964532c08617885e7987492b7e52c5ef7bcca74d553074c92813 |
i386 | |
vnc-4.0-12.el4.i386.rpm | SHA-256: 2e82e1375d32f026cce46a0356cda53371cf75e55dc9189afdd6249bc94954d2 |
vnc-4.0-12.el4.i386.rpm | SHA-256: 2e82e1375d32f026cce46a0356cda53371cf75e55dc9189afdd6249bc94954d2 |
vnc-server-4.0-12.el4.i386.rpm | SHA-256: e6de02482488064e4743f180727a7d1b302470bd370b713ca764be8ed19357c0 |
vnc-server-4.0-12.el4.i386.rpm | SHA-256: e6de02482488064e4743f180727a7d1b302470bd370b713ca764be8ed19357c0 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
vnc-4.0-12.el4.src.rpm | SHA-256: 54b3d6c95e02027d17e74cffc381ce5074667f26bb4dfba2e31fd8f112acc44e |
x86_64 | |
vnc-4.0-12.el4.x86_64.rpm | SHA-256: 2dc99ef6a99817ee2d5bbcec85d4905526acdd266343cdfab23f98d787d24df2 |
vnc-server-4.0-12.el4.x86_64.rpm | SHA-256: 477317947ecc77dc495202bbae002e8e1de7efcb131e90da0cfc247ec3574fe0 |
ia64 | |
vnc-4.0-12.el4.ia64.rpm | SHA-256: 5dc41022a3ceb1dd4135b27858cfa3029fcb8372bc3ab41f571e7cbf110ef683 |
vnc-server-4.0-12.el4.ia64.rpm | SHA-256: 3b029eb974e3964532c08617885e7987492b7e52c5ef7bcca74d553074c92813 |
i386 | |
vnc-4.0-12.el4.i386.rpm | SHA-256: 2e82e1375d32f026cce46a0356cda53371cf75e55dc9189afdd6249bc94954d2 |
vnc-server-4.0-12.el4.i386.rpm | SHA-256: e6de02482488064e4743f180727a7d1b302470bd370b713ca764be8ed19357c0 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
vnc-4.0-12.el4.src.rpm | SHA-256: 54b3d6c95e02027d17e74cffc381ce5074667f26bb4dfba2e31fd8f112acc44e |
x86_64 | |
vnc-4.0-12.el4.x86_64.rpm | SHA-256: 2dc99ef6a99817ee2d5bbcec85d4905526acdd266343cdfab23f98d787d24df2 |
vnc-server-4.0-12.el4.x86_64.rpm | SHA-256: 477317947ecc77dc495202bbae002e8e1de7efcb131e90da0cfc247ec3574fe0 |
i386 | |
vnc-4.0-12.el4.i386.rpm | SHA-256: 2e82e1375d32f026cce46a0356cda53371cf75e55dc9189afdd6249bc94954d2 |
vnc-server-4.0-12.el4.i386.rpm | SHA-256: e6de02482488064e4743f180727a7d1b302470bd370b713ca764be8ed19357c0 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
vnc-4.0-12.el4.src.rpm | SHA-256: 54b3d6c95e02027d17e74cffc381ce5074667f26bb4dfba2e31fd8f112acc44e |
s390x | |
vnc-4.0-12.el4.s390x.rpm | SHA-256: 1f399419053aa200c725387330b6c215f55c5bbe42370129cb22334b79ab79ea |
vnc-server-4.0-12.el4.s390x.rpm | SHA-256: 17ac3c225c0b60142b8c1c2a4195c99745d0070113079b4661433fddb7d6409a |
s390 | |
vnc-4.0-12.el4.s390.rpm | SHA-256: aa4cbf0a76c8f40e39f446bffd2eaf9201744a9cf8d75bd092c9639a64fad2d1 |
vnc-server-4.0-12.el4.s390.rpm | SHA-256: 99b07a58bee8961fc9200ba55a9c2512708edc4c73819d464ae11be63c0f8f97 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
vnc-4.0-12.el4.src.rpm | SHA-256: 54b3d6c95e02027d17e74cffc381ce5074667f26bb4dfba2e31fd8f112acc44e |
ppc | |
vnc-4.0-12.el4.ppc.rpm | SHA-256: ae5a102bc7bd43da395283cea23babd6c139a6e6e5aa03c5b2dd9eea55ad3c32 |
vnc-server-4.0-12.el4.ppc.rpm | SHA-256: 5288f05ac0c69b5edd670b4522841e6bbe42b181984f6d1f7c02eb926afc8403 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.