- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0773 - Bug Fix Advisory
Synopsis
gtk2 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gtk2 packages that resolve an issue are now available.
Description
GTK+ is a multi-platform toolkit for creating graphical user interfaces.
This updated package addresses the following bug:
- processes that used GTK+ and which ran for multiple days (and longer)
could cause a serial overflow bug to present, causing GTK+ to terminate.
Consequently, all open windows in an affected Gnome session would abruptly
close. This updated package changes the way this particular serial count is
tracked, ensuring the overflow does not occur.
All users are advised to upgrade to these updated gtk2 packages, which
resolve this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 446045 - GUI/VNC installs not working. exits when gtk.main() is called
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
gtk2-2.4.13-24.el4.src.rpm | SHA-256: 8e2d71b01c2af9c9089a15d85e57ff507ea0d57606ce2cc78b3c767c24d996c4 |
x86_64 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.x86_64.rpm | SHA-256: 56560a9da64d758da90aac80d47eef23c8ba6e59e1cc64c5cf24f28a0e24599c |
gtk2-2.4.13-24.el4.x86_64.rpm | SHA-256: 56560a9da64d758da90aac80d47eef23c8ba6e59e1cc64c5cf24f28a0e24599c |
gtk2-devel-2.4.13-24.el4.x86_64.rpm | SHA-256: a300d22d7783f900007c882e1c1a624f01faf2e7d90e4c00654d8fe8c1c15692 |
gtk2-devel-2.4.13-24.el4.x86_64.rpm | SHA-256: a300d22d7783f900007c882e1c1a624f01faf2e7d90e4c00654d8fe8c1c15692 |
ia64 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.ia64.rpm | SHA-256: 3abaaf6b02bbd7c958aa7c2adb87a219686c3e707f703737c6fbb87de9df3439 |
gtk2-2.4.13-24.el4.ia64.rpm | SHA-256: 3abaaf6b02bbd7c958aa7c2adb87a219686c3e707f703737c6fbb87de9df3439 |
gtk2-devel-2.4.13-24.el4.ia64.rpm | SHA-256: 6f9a04cc567b303821cf84a8edf2124a143508d32c0a62b3bb471430348cfed8 |
gtk2-devel-2.4.13-24.el4.ia64.rpm | SHA-256: 6f9a04cc567b303821cf84a8edf2124a143508d32c0a62b3bb471430348cfed8 |
i386 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-devel-2.4.13-24.el4.i386.rpm | SHA-256: 936f4abe64812caadea353bcc4a78b228e295c0211727c0e4f7a950b802363bb |
gtk2-devel-2.4.13-24.el4.i386.rpm | SHA-256: 936f4abe64812caadea353bcc4a78b228e295c0211727c0e4f7a950b802363bb |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
gtk2-2.4.13-24.el4.src.rpm | SHA-256: 8e2d71b01c2af9c9089a15d85e57ff507ea0d57606ce2cc78b3c767c24d996c4 |
x86_64 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.x86_64.rpm | SHA-256: 56560a9da64d758da90aac80d47eef23c8ba6e59e1cc64c5cf24f28a0e24599c |
gtk2-devel-2.4.13-24.el4.x86_64.rpm | SHA-256: a300d22d7783f900007c882e1c1a624f01faf2e7d90e4c00654d8fe8c1c15692 |
ia64 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.ia64.rpm | SHA-256: 3abaaf6b02bbd7c958aa7c2adb87a219686c3e707f703737c6fbb87de9df3439 |
gtk2-devel-2.4.13-24.el4.ia64.rpm | SHA-256: 6f9a04cc567b303821cf84a8edf2124a143508d32c0a62b3bb471430348cfed8 |
i386 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-devel-2.4.13-24.el4.i386.rpm | SHA-256: 936f4abe64812caadea353bcc4a78b228e295c0211727c0e4f7a950b802363bb |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
gtk2-2.4.13-24.el4.src.rpm | SHA-256: 8e2d71b01c2af9c9089a15d85e57ff507ea0d57606ce2cc78b3c767c24d996c4 |
x86_64 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-2.4.13-24.el4.x86_64.rpm | SHA-256: 56560a9da64d758da90aac80d47eef23c8ba6e59e1cc64c5cf24f28a0e24599c |
gtk2-devel-2.4.13-24.el4.x86_64.rpm | SHA-256: a300d22d7783f900007c882e1c1a624f01faf2e7d90e4c00654d8fe8c1c15692 |
i386 | |
gtk2-2.4.13-24.el4.i386.rpm | SHA-256: 614104404bff2376fafefd62057b7ded04793d28e42bbe9b352447129fc84906 |
gtk2-devel-2.4.13-24.el4.i386.rpm | SHA-256: 936f4abe64812caadea353bcc4a78b228e295c0211727c0e4f7a950b802363bb |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
gtk2-2.4.13-24.el4.src.rpm | SHA-256: 8e2d71b01c2af9c9089a15d85e57ff507ea0d57606ce2cc78b3c767c24d996c4 |
s390x | |
gtk2-2.4.13-24.el4.s390.rpm | SHA-256: f09daf4c509ce3658bf3d4966f126730d8280458eca3c57b02e957725059c86b |
gtk2-2.4.13-24.el4.s390x.rpm | SHA-256: 97d35749247d8ac274acd06d7110acd14c1e4c7e81acbe01f5a99dbc8c353c3e |
gtk2-devel-2.4.13-24.el4.s390x.rpm | SHA-256: 44d2106ed9a901490416e0b15fba79b62bc97002ac8ad8211874420c8362954d |
s390 | |
gtk2-2.4.13-24.el4.s390.rpm | SHA-256: f09daf4c509ce3658bf3d4966f126730d8280458eca3c57b02e957725059c86b |
gtk2-devel-2.4.13-24.el4.s390.rpm | SHA-256: 3daea25e19b0569f8f59efa1db73375c82611e262fca48c620f79c0b8941eda2 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
gtk2-2.4.13-24.el4.src.rpm | SHA-256: 8e2d71b01c2af9c9089a15d85e57ff507ea0d57606ce2cc78b3c767c24d996c4 |
ppc | |
gtk2-2.4.13-24.el4.ppc.rpm | SHA-256: 2118d370aa7d4a0f8c8afed3bb5cafe214292e911f1dd8f4b7847f81915bfc29 |
gtk2-2.4.13-24.el4.ppc64.rpm | SHA-256: 66d814ebf7ba079c514b608b0ca31c4a53895c244b3cda962e2803d3323b35a4 |
gtk2-devel-2.4.13-24.el4.ppc.rpm | SHA-256: 612066780139a13903c27f51332f5f9c1c0f672cbadd66d0939f455805667051 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.