Bug Fix Advisory ibus-hangul bug fix update

Advisory: RHBA-2013:1036-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-07-10
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ibus-hangul packages that fix one bug are now available.

The ibus-hangul package is a Korean language input engine platform for the IBus
input method (IM).

This update fixes the following bug:

* Previously, the Hangul engine for IBus did not function properly. If a preedit
string was available, and the input focus was moved to another window, then the
preedit string was committed. After that, when the input focus was moved back to
the window, the X Input Method (XIM) could not handle the first key input. This
update resolves this issue with a change in the code, and key press inputs after
a focus change are no longer lost in the described scenario. (BZ#965554).

Users of ibus-hangul are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ibus-hangul-1.3.0.20100329-6.el6.src.rpm     MD5: aba40f5c7e3d25b41bf0d5a4a83e0066
SHA-256: 0eb6de914221f6e61b84e772cea83cbb16eaa1d6afd117b399572db6268aab8d
 
IA-32:
ibus-hangul-1.3.0.20100329-6.el6.i686.rpm     MD5: 2d7a17ec58e129548690d38ac271e6af
SHA-256: 626c46be0640ab5bfbf0670d699dad866668fd7ec9d93c7caf1b1f99f38e30f3
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.i686.rpm     MD5: 3bc3b74beb7f08bc1d90b2cae9aa86f8
SHA-256: f0601e823a6740b9a4dc5faf2e6cf0fdddaaf07379702324f423d66c4dd0feae
 
x86_64:
ibus-hangul-1.3.0.20100329-6.el6.x86_64.rpm     MD5: c5019f21b0bb80c8d894b1d759fdd62a
SHA-256: dcf4c9bc8a8b7fcf1acba7bdb005e8d55990c917fdbe4f1e095d9bcc2f72cfbd
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.x86_64.rpm     MD5: 62cef80fa982d1cf70e6e306312bc344
SHA-256: f162a6bb0bfba3d05a4280b67c04132ccfff2e0101835d179812b4a2e540e68a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ibus-hangul-1.3.0.20100329-6.el6.src.rpm     MD5: aba40f5c7e3d25b41bf0d5a4a83e0066
SHA-256: 0eb6de914221f6e61b84e772cea83cbb16eaa1d6afd117b399572db6268aab8d
 
IA-32:
ibus-hangul-1.3.0.20100329-6.el6.i686.rpm     MD5: 2d7a17ec58e129548690d38ac271e6af
SHA-256: 626c46be0640ab5bfbf0670d699dad866668fd7ec9d93c7caf1b1f99f38e30f3
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.i686.rpm     MD5: 3bc3b74beb7f08bc1d90b2cae9aa86f8
SHA-256: f0601e823a6740b9a4dc5faf2e6cf0fdddaaf07379702324f423d66c4dd0feae
 
PPC:
ibus-hangul-1.3.0.20100329-6.el6.ppc64.rpm     MD5: 2138b2074b9652672e60c4e60eb12402
SHA-256: 38d1b61a0e578e8cfd82eeefb3fc75d750d5e9b16c7d7d0e80840eb561b6bb1c
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.ppc64.rpm     MD5: 539736aebf9fabadb8df1dfe0055505f
SHA-256: c0d02e0ef830cad33ce3cdf8790ef58c5ba8072650aeef83ec7137edf2bb3c10
 
s390x:
ibus-hangul-1.3.0.20100329-6.el6.s390x.rpm     MD5: bdaa82e549123fe099dadc7ffe9ce190
SHA-256: 631b1df528db99a8c7effe1728b93771edc418843f2bc2b1c7c75a7371bd1c41
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.s390x.rpm     MD5: c9c2f164881bc2396de25fee788c6e19
SHA-256: dd43c7ca1958c5e3da8b2d7a147da2b81abe4e18c715e3e4cf9567e60126199a
 
x86_64:
ibus-hangul-1.3.0.20100329-6.el6.x86_64.rpm     MD5: c5019f21b0bb80c8d894b1d759fdd62a
SHA-256: dcf4c9bc8a8b7fcf1acba7bdb005e8d55990c917fdbe4f1e095d9bcc2f72cfbd
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.x86_64.rpm     MD5: 62cef80fa982d1cf70e6e306312bc344
SHA-256: f162a6bb0bfba3d05a4280b67c04132ccfff2e0101835d179812b4a2e540e68a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ibus-hangul-1.3.0.20100329-6.el6.src.rpm     MD5: aba40f5c7e3d25b41bf0d5a4a83e0066
SHA-256: 0eb6de914221f6e61b84e772cea83cbb16eaa1d6afd117b399572db6268aab8d
 
IA-32:
ibus-hangul-1.3.0.20100329-6.el6.i686.rpm     MD5: 2d7a17ec58e129548690d38ac271e6af
SHA-256: 626c46be0640ab5bfbf0670d699dad866668fd7ec9d93c7caf1b1f99f38e30f3
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.i686.rpm     MD5: 3bc3b74beb7f08bc1d90b2cae9aa86f8
SHA-256: f0601e823a6740b9a4dc5faf2e6cf0fdddaaf07379702324f423d66c4dd0feae
 
x86_64:
ibus-hangul-1.3.0.20100329-6.el6.x86_64.rpm     MD5: c5019f21b0bb80c8d894b1d759fdd62a
SHA-256: dcf4c9bc8a8b7fcf1acba7bdb005e8d55990c917fdbe4f1e095d9bcc2f72cfbd
ibus-hangul-debuginfo-1.3.0.20100329-6.el6.x86_64.rpm     MD5: 62cef80fa982d1cf70e6e306312bc344
SHA-256: f162a6bb0bfba3d05a4280b67c04132ccfff2e0101835d179812b4a2e540e68a
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/