Skip to navigation

Bug Fix Advisory vnc bug fix update

Advisory: RHBA-2011:0216-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-02-11
Last updated on: 2011-02-11
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

Updated vnc packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.

Virtual Network Computing (VNC) is a remote display system which allows you to
view a computing "desktop" environment not only on the machine where it is
running, but from anywhere on the Internet and from a wide variety of machine
architectures.

This update fixes the following bugs:

* Prior to this update, the Xvnc server could refuse a connection when it
received the SIGALRM signal during the reading of a password file. With this
update, the underlying source code has been modified to address this issue, and
receiving the SIGALRM signal no longer prevents clients from establishing a
connection. (BZ#670249)

* On a system with more than 256 network interfaces, Xvnc terminated
unexpectedly during startup. This error has been fixed, and Xvnc no longer
crashes on systems with a large number of network interfaces. (BZ#673976)

All users of vnc are advised to upgrade to these updated packages, which resolve
these issues.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
vnc-4.1.2-14.el5_6.6.src.rpm     MD5: 6c6bbcaf7756add315d1dcd256035660
SHA-256: d44828f723970ae0595bcb1bc04041adea84447deedfe9c355e06d375d4d7a85
 
IA-32:
vnc-4.1.2-14.el5_6.6.i386.rpm     MD5: b94e632cba4fe3fb8637f7d0553ba7c3
SHA-256: 69edd16da0cc6ff01cbe3a2ce5061828ecd15d97ae886d93059d0ee95ed36cc2
vnc-server-4.1.2-14.el5_6.6.i386.rpm     MD5: 0148d77100426616b25004da8ff68505
SHA-256: e859f10394b3512334eabc5ab2ee6ca5069b3840f36faff2e75fce8beddf3efd
 
IA-64:
vnc-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6375a2cf8d606b06f7585ed450a1ce1c
SHA-256: 5ec37c9f1591fbfe4244f71a186e1a40d033a548a50b0a61c15dd0d786ac6da7
vnc-server-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6700a6c651f5f10e1a38b7b54a2bdcc1
SHA-256: bb9071a6d1d2bde323e419219e99d342d761c0393ce360849caf15b6ec69a3dd
 
PPC:
vnc-4.1.2-14.el5_6.6.ppc.rpm     MD5: 4802803045c6876acc7f7893e1ff9436
SHA-256: 5f5405b9a8b3ec33a67784da8108df5563d0ce216a23b9126d370f96b0a15bcf
vnc-server-4.1.2-14.el5_6.6.ppc.rpm     MD5: faa325fa76974220254764b3cc2d9bfd
SHA-256: 1d8ebe69592036848f0dd9528ae80f78c363b8abf40bfd22eda5494247785156
 
s390x:
vnc-4.1.2-14.el5_6.6.s390x.rpm     MD5: 8be61b51c34c7ea80bd9a4ebc9a2c09e
SHA-256: 3b2e70dba3400f686205f63b1e9ae40b0d0412d51ad8aa2d036bff3db0e9fc3c
vnc-server-4.1.2-14.el5_6.6.s390x.rpm     MD5: a8d42881cafc0d59b65220f05b8170e1
SHA-256: ef8c3d49eab8ca35b5ee6200d2c3271ac6c4622d3fc4cddf7a91dd4c7e9800fd
 
x86_64:
vnc-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 2115bee8454e17f8a5b23818f4b87725
SHA-256: 87a59db213e8ebc7031b3e049c4e2c4be7c2e96d90118627da02bdad0b405597
vnc-server-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 06de8d0662c825c51ab813e39163664e
SHA-256: 1265f4dbb1e73e9f7b54032e063ba6fd17acdb0da194c102d353b2705499f521
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
vnc-4.1.2-14.el5_6.6.src.rpm     MD5: 6c6bbcaf7756add315d1dcd256035660
SHA-256: d44828f723970ae0595bcb1bc04041adea84447deedfe9c355e06d375d4d7a85
 
IA-32:
vnc-4.1.2-14.el5_6.6.i386.rpm     MD5: b94e632cba4fe3fb8637f7d0553ba7c3
SHA-256: 69edd16da0cc6ff01cbe3a2ce5061828ecd15d97ae886d93059d0ee95ed36cc2
vnc-server-4.1.2-14.el5_6.6.i386.rpm     MD5: 0148d77100426616b25004da8ff68505
SHA-256: e859f10394b3512334eabc5ab2ee6ca5069b3840f36faff2e75fce8beddf3efd
 
x86_64:
vnc-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 2115bee8454e17f8a5b23818f4b87725
SHA-256: 87a59db213e8ebc7031b3e049c4e2c4be7c2e96d90118627da02bdad0b405597
vnc-server-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 06de8d0662c825c51ab813e39163664e
SHA-256: 1265f4dbb1e73e9f7b54032e063ba6fd17acdb0da194c102d353b2705499f521
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
vnc-4.1.2-14.el5_6.6.src.rpm     MD5: 6c6bbcaf7756add315d1dcd256035660
SHA-256: d44828f723970ae0595bcb1bc04041adea84447deedfe9c355e06d375d4d7a85
 
IA-32:
vnc-4.1.2-14.el5_6.6.i386.rpm     MD5: b94e632cba4fe3fb8637f7d0553ba7c3
SHA-256: 69edd16da0cc6ff01cbe3a2ce5061828ecd15d97ae886d93059d0ee95ed36cc2
vnc-server-4.1.2-14.el5_6.6.i386.rpm     MD5: 0148d77100426616b25004da8ff68505
SHA-256: e859f10394b3512334eabc5ab2ee6ca5069b3840f36faff2e75fce8beddf3efd
 
IA-64:
vnc-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6375a2cf8d606b06f7585ed450a1ce1c
SHA-256: 5ec37c9f1591fbfe4244f71a186e1a40d033a548a50b0a61c15dd0d786ac6da7
vnc-server-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6700a6c651f5f10e1a38b7b54a2bdcc1
SHA-256: bb9071a6d1d2bde323e419219e99d342d761c0393ce360849caf15b6ec69a3dd
 
PPC:
vnc-4.1.2-14.el5_6.6.ppc.rpm     MD5: 4802803045c6876acc7f7893e1ff9436
SHA-256: 5f5405b9a8b3ec33a67784da8108df5563d0ce216a23b9126d370f96b0a15bcf
vnc-server-4.1.2-14.el5_6.6.ppc.rpm     MD5: faa325fa76974220254764b3cc2d9bfd
SHA-256: 1d8ebe69592036848f0dd9528ae80f78c363b8abf40bfd22eda5494247785156
 
s390x:
vnc-4.1.2-14.el5_6.6.s390x.rpm     MD5: 8be61b51c34c7ea80bd9a4ebc9a2c09e
SHA-256: 3b2e70dba3400f686205f63b1e9ae40b0d0412d51ad8aa2d036bff3db0e9fc3c
vnc-server-4.1.2-14.el5_6.6.s390x.rpm     MD5: a8d42881cafc0d59b65220f05b8170e1
SHA-256: ef8c3d49eab8ca35b5ee6200d2c3271ac6c4622d3fc4cddf7a91dd4c7e9800fd
 
x86_64:
vnc-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 2115bee8454e17f8a5b23818f4b87725
SHA-256: 87a59db213e8ebc7031b3e049c4e2c4be7c2e96d90118627da02bdad0b405597
vnc-server-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 06de8d0662c825c51ab813e39163664e
SHA-256: 1265f4dbb1e73e9f7b54032e063ba6fd17acdb0da194c102d353b2705499f521
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
vnc-4.1.2-14.el5_6.6.src.rpm     MD5: 6c6bbcaf7756add315d1dcd256035660
SHA-256: d44828f723970ae0595bcb1bc04041adea84447deedfe9c355e06d375d4d7a85
 
IA-32:
vnc-4.1.2-14.el5_6.6.i386.rpm     MD5: b94e632cba4fe3fb8637f7d0553ba7c3
SHA-256: 69edd16da0cc6ff01cbe3a2ce5061828ecd15d97ae886d93059d0ee95ed36cc2
vnc-server-4.1.2-14.el5_6.6.i386.rpm     MD5: 0148d77100426616b25004da8ff68505
SHA-256: e859f10394b3512334eabc5ab2ee6ca5069b3840f36faff2e75fce8beddf3efd
 
IA-64:
vnc-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6375a2cf8d606b06f7585ed450a1ce1c
SHA-256: 5ec37c9f1591fbfe4244f71a186e1a40d033a548a50b0a61c15dd0d786ac6da7
vnc-server-4.1.2-14.el5_6.6.ia64.rpm     MD5: 6700a6c651f5f10e1a38b7b54a2bdcc1
SHA-256: bb9071a6d1d2bde323e419219e99d342d761c0393ce360849caf15b6ec69a3dd
 
x86_64:
vnc-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 2115bee8454e17f8a5b23818f4b87725
SHA-256: 87a59db213e8ebc7031b3e049c4e2c4be7c2e96d90118627da02bdad0b405597
vnc-server-4.1.2-14.el5_6.6.x86_64.rpm     MD5: 06de8d0662c825c51ab813e39163664e
SHA-256: 1265f4dbb1e73e9f7b54032e063ba6fd17acdb0da194c102d353b2705499f521
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

673976 - VNC server crashes at startup if more than 256 interfaces are defined on the system


Keywords

Xvnc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/