Skip to navigation

Bug Fix Advisory virt-viewer bug fix update

Advisory: RHBA-2013:0684-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-03-26
Last updated on: 2013-03-26
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated virt-viewer packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The virt-viewer packages provide Virtual Machine Viewer, which is a lightweight
interface for interacting with the graphical display of a virtualized guest.
Virtual Machine Viewer uses libvirt and is intended as a replacement for
traditional VNC or SPICE clients.

This update fixes the following bug:

* Previously, when switched to full-screen, multiple monitor displays in both
client and guest appeared to have the same resolution, even though the monitors
were different. With this update, monitors display resolution according to their
capacity. (BZ#918570)

Users of virt-viewer are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
IA-32:
virt-viewer-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: e66f720ce3355a4cdc7a41729cbf0cdb
SHA-256: fdf0ff0e8ef4470f8c4026348ca126296a322800869aca27e7c4ab80a253b630
virt-viewer-debuginfo-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: aa1872ff632608ca76db42c3ea22ce44
SHA-256: 32c856700fd050152a0a3cede3896552a9a14a680d6d6d664b65b379452cdbb3
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
IA-32:
virt-viewer-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: e66f720ce3355a4cdc7a41729cbf0cdb
SHA-256: fdf0ff0e8ef4470f8c4026348ca126296a322800869aca27e7c4ab80a253b630
virt-viewer-debuginfo-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: aa1872ff632608ca76db42c3ea22ce44
SHA-256: 32c856700fd050152a0a3cede3896552a9a14a680d6d6d664b65b379452cdbb3
 
PPC:
virt-viewer-0.5.2-18.el6_4.2.ppc64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 218ff6dfaec9400794b45d2e4472e3bd
SHA-256: 8b1d1ebc329353d27dd3ccc84c17c322570920569c1af979aeb0eb4634066bb8
virt-viewer-debuginfo-0.5.2-18.el6_4.2.ppc64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 7c608191a6eb8aa3bd884440a7e91765
SHA-256: 5fde5aa5570665a2387cecec7b4a53d3143439a7a3c3beab8201a3079575369c
 
s390x:
virt-viewer-0.5.2-18.el6_4.2.s390x.rpm
File outdated by:  RHBA-2013:1578
    MD5: e07d50cb426347c8dbcc95f7ab7becd1
SHA-256: a3b0715348da60ed5706c61ab56b5c41fe714e226f8f0da16b64dff6bcfaa47e
virt-viewer-debuginfo-0.5.2-18.el6_4.2.s390x.rpm
File outdated by:  RHBA-2013:1578
    MD5: ad82360f2a73ce8fb0da20b484ee085e
SHA-256: 2c3c16231b53e661706a5f9c1da61bd1c7e34cbf4c7969e022baf7b922acca8b
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm     MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm     MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
IA-32:
virt-viewer-0.5.2-18.el6_4.2.i686.rpm     MD5: e66f720ce3355a4cdc7a41729cbf0cdb
SHA-256: fdf0ff0e8ef4470f8c4026348ca126296a322800869aca27e7c4ab80a253b630
virt-viewer-debuginfo-0.5.2-18.el6_4.2.i686.rpm     MD5: aa1872ff632608ca76db42c3ea22ce44
SHA-256: 32c856700fd050152a0a3cede3896552a9a14a680d6d6d664b65b379452cdbb3
 
PPC:
virt-viewer-0.5.2-18.el6_4.2.ppc64.rpm     MD5: 218ff6dfaec9400794b45d2e4472e3bd
SHA-256: 8b1d1ebc329353d27dd3ccc84c17c322570920569c1af979aeb0eb4634066bb8
virt-viewer-debuginfo-0.5.2-18.el6_4.2.ppc64.rpm     MD5: 7c608191a6eb8aa3bd884440a7e91765
SHA-256: 5fde5aa5570665a2387cecec7b4a53d3143439a7a3c3beab8201a3079575369c
 
s390x:
virt-viewer-0.5.2-18.el6_4.2.s390x.rpm     MD5: e07d50cb426347c8dbcc95f7ab7becd1
SHA-256: a3b0715348da60ed5706c61ab56b5c41fe714e226f8f0da16b64dff6bcfaa47e
virt-viewer-debuginfo-0.5.2-18.el6_4.2.s390x.rpm     MD5: ad82360f2a73ce8fb0da20b484ee085e
SHA-256: 2c3c16231b53e661706a5f9c1da61bd1c7e34cbf4c7969e022baf7b922acca8b
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm     MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm     MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
virt-viewer-0.5.2-18.el6_4.2.src.rpm
File outdated by:  RHBA-2013:1578
    MD5: a5a0fbbc54b4897dd394dfea63ebb6ce
SHA-256: 224aea21aa05a829bb9488c4e5b411333673f63c75bedf9e11d74922629cedf3
 
IA-32:
virt-viewer-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: e66f720ce3355a4cdc7a41729cbf0cdb
SHA-256: fdf0ff0e8ef4470f8c4026348ca126296a322800869aca27e7c4ab80a253b630
virt-viewer-debuginfo-0.5.2-18.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1578
    MD5: aa1872ff632608ca76db42c3ea22ce44
SHA-256: 32c856700fd050152a0a3cede3896552a9a14a680d6d6d664b65b379452cdbb3
 
x86_64:
virt-viewer-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 5af40e832761eb8516a56fb6ff8dd8d1
SHA-256: accff1cf6460154db2f4065f2a9a33c783d1e0d8fff77a1d6ae643420dc3ab07
virt-viewer-debuginfo-0.5.2-18.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1578
    MD5: 6170ba0d645c432a758af273628c85c4
SHA-256: 5dbd07717568ba0af94f92ca80505e19d5c329a5268c35dddca0e393e52af31a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

918570 - All "windows" have the same resolution in fullscreen



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/