Bug Fix Advisory gnome-screensaver bug fix update

Advisory: RHBA-2013:1706-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated gnome-screensaver packages that fix two bugs are now available for Red
Hat Enterprise Linux 6.

The gnome-screensaver packages contain the GNOME project's official screen saver
program. The screen saver is designed for improved integration with the GNOME
desktop, including themeability, language support, and Human Interface
Guidelines (HIG) compliance. It also provides screen-locking and fast
user-switching from a locked screen.

This update fixes the following bugs:

* Previously, when using the virt-manager, virt-viewer, and spice-xpi
applications, users were unable to enter the gnome-screensaver password after
the screen saver had started. This occurred only when the virtual machine system
used the Compiz composting window manager. After users had released the mouse
cursor, then pressed a key to enter the password, the dialog window did not
accept any input. This happened due to incorrect assignment of window focus to
applications that did not drop their keyboard grab. With this update, window
focus is now properly assigned to the correct place, and attempts to enter the
gnome-screensaver password no longer fail in the described scenario. (BZ#905935)

* Prior to this update, the gnome-screensaver utility worked incorrectly when
using an X server that does not support the fade-out function. Consequently,
gnome-screensaver terminated unexpectedly when trying to fade out the monitor.
This bug has been fixed and gnome-screensaver now detects a potential fade-out
failure and recovers instead of crashing. (BZ#947671)

Users of gnome-screensaver are advised to upgrade to these updated packages,
which fix these bugs.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
gnome-screensaver-2.28.3-28.el6.src.rpm     MD5: 87b1c7f53ace62d1abbfd2dac1df8925
SHA-256: fd9732856747bee56437396110716383c9a9b7e129248756b2bf06a963600344
 
IA-32:
gnome-screensaver-2.28.3-28.el6.i686.rpm     MD5: 8bc4bce47c8ea8be6fabfff2b573bc7e
SHA-256: 354a994eaeef84acc75b9e3e0f5517ce4f72fbc524bccf14604af2c09ef7d75c
gnome-screensaver-debuginfo-2.28.3-28.el6.i686.rpm     MD5: e6536f46f8f25891bbbb556f57d310bb
SHA-256: 9cf7b72d422a1ad73f373c33cd582412fa7933c5e676c898fff25e021ecf2d14
 
x86_64:
gnome-screensaver-2.28.3-28.el6.x86_64.rpm     MD5: 13731abc1497a606bbc3c6e307aad646
SHA-256: 8b53eb695db97dd7be4bb65ef5c175f4e5b9a561ad02b64c2b4d3060ab3c6e8c
gnome-screensaver-debuginfo-2.28.3-28.el6.x86_64.rpm     MD5: 1803a244a160665fc472d8eacdec8564
SHA-256: bab3016f4ccb09d75e61e81186db1898b61456a11be2d5104f0ac58b1a9e2f0d
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
gnome-screensaver-2.28.3-28.el6.src.rpm     MD5: 87b1c7f53ace62d1abbfd2dac1df8925
SHA-256: fd9732856747bee56437396110716383c9a9b7e129248756b2bf06a963600344
 
IA-32:
gnome-screensaver-2.28.3-28.el6.i686.rpm     MD5: 8bc4bce47c8ea8be6fabfff2b573bc7e
SHA-256: 354a994eaeef84acc75b9e3e0f5517ce4f72fbc524bccf14604af2c09ef7d75c
gnome-screensaver-debuginfo-2.28.3-28.el6.i686.rpm     MD5: e6536f46f8f25891bbbb556f57d310bb
SHA-256: 9cf7b72d422a1ad73f373c33cd582412fa7933c5e676c898fff25e021ecf2d14
 
PPC:
gnome-screensaver-2.28.3-28.el6.ppc64.rpm     MD5: db18bddfaf9fcd156ec2b833e0e6972a
SHA-256: 24e93e4156bf54c0a37ce948c1904fec62a08041397fc6926dedb84548f51bc4
gnome-screensaver-debuginfo-2.28.3-28.el6.ppc64.rpm     MD5: 4638840a2eae0dc3c7f43a7413a13631
SHA-256: 5160602e338b4d248c1870ad385f149ed3afcecd93bded8dddac7b4a76504b71
 
s390x:
gnome-screensaver-2.28.3-28.el6.s390x.rpm     MD5: fdd9aadc9eace8f72a14301500db0c76
SHA-256: fa44751ab0272e9cc14cd5305e6ae077e921fb366566f48fe9bd579210cf4800
gnome-screensaver-debuginfo-2.28.3-28.el6.s390x.rpm     MD5: de8969d63238be7d96754004be48d1f7
SHA-256: bfa6858481bf521ce4fc790b0ddc2009a8c7adcbd97d82807e79eedfaa45db5d
 
x86_64:
gnome-screensaver-2.28.3-28.el6.x86_64.rpm     MD5: 13731abc1497a606bbc3c6e307aad646
SHA-256: 8b53eb695db97dd7be4bb65ef5c175f4e5b9a561ad02b64c2b4d3060ab3c6e8c
gnome-screensaver-debuginfo-2.28.3-28.el6.x86_64.rpm     MD5: 1803a244a160665fc472d8eacdec8564
SHA-256: bab3016f4ccb09d75e61e81186db1898b61456a11be2d5104f0ac58b1a9e2f0d
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
gnome-screensaver-2.28.3-28.el6.src.rpm     MD5: 87b1c7f53ace62d1abbfd2dac1df8925
SHA-256: fd9732856747bee56437396110716383c9a9b7e129248756b2bf06a963600344
 
IA-32:
gnome-screensaver-2.28.3-28.el6.i686.rpm     MD5: 8bc4bce47c8ea8be6fabfff2b573bc7e
SHA-256: 354a994eaeef84acc75b9e3e0f5517ce4f72fbc524bccf14604af2c09ef7d75c
gnome-screensaver-debuginfo-2.28.3-28.el6.i686.rpm     MD5: e6536f46f8f25891bbbb556f57d310bb
SHA-256: 9cf7b72d422a1ad73f373c33cd582412fa7933c5e676c898fff25e021ecf2d14
 
x86_64:
gnome-screensaver-2.28.3-28.el6.x86_64.rpm     MD5: 13731abc1497a606bbc3c6e307aad646
SHA-256: 8b53eb695db97dd7be4bb65ef5c175f4e5b9a561ad02b64c2b4d3060ab3c6e8c
gnome-screensaver-debuginfo-2.28.3-28.el6.x86_64.rpm     MD5: 1803a244a160665fc472d8eacdec8564
SHA-256: bab3016f4ccb09d75e61e81186db1898b61456a11be2d5104f0ac58b1a9e2f0d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

905935 - virt-viewer - unable to enter gnome-screensaver password
998448 - [abrt] gnome-screensaver-2.28.3-27.el6: find_usable_monitor: Process /usr/bin/gnome-screensaver was killed by signal 11 (SIGSEGV)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/