Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2007:0219 - Bug Fix Advisory
Issued:
2007-05-01
Updated:
2007-05-01

RHBA-2007:0219 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

vte bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vte packages that fixes various issues are now available.

Description

VTE is an experimental terminal emulator widget for use with GTK+ 2.0.

When using VTE with some applications like ispell or nano, rendering
artifacts could occur. With this bug fix, several such issues are fixed.

Certain East Asian applications had problems with some double-width
characters when run under East Asian UTF-8 locales (as opposed to
non-UTF-8 locales).

To fix this, the VTE_CJK_WIDTH environment variable can be set when
running vte or gnome-terminal, to get behavior that better matches
non-UTF-8 East Asian locales.

However, this has a negative effect on some other applications that use
box-drawing characters. Consequently, the VTE_CJK_WIDTH environment
variable is not enabled by default. (Note that gnome-terminal should be
run with the --disable-factory option to run as a new process and not
attach to an existing process.)

Previously, when the terminal process was killed, it left uncleaned
utmp/wtmp records behind. This is fixed now.

Users should upgrade to these updated packages, which resolve these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 165193 - [RHEL-4] gnome-pty-helper doesn't clean up gnome-terminals' utmp/wtmp entries when killed
  • BZ - 184596 - artifacts when running with TERM=xterm and ispell
  • BZ - 186464 - nano scrolling distortion

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
vte-0.11.11-11.el4.src.rpm SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529
x86_64
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.x86_64.rpm SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766
vte-0.11.11-11.el4.x86_64.rpm SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766
vte-devel-0.11.11-11.el4.x86_64.rpm SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa
vte-devel-0.11.11-11.el4.x86_64.rpm SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa
ia64
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.ia64.rpm SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236
vte-0.11.11-11.el4.ia64.rpm SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236
vte-devel-0.11.11-11.el4.ia64.rpm SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a
vte-devel-0.11.11-11.el4.ia64.rpm SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a
i386
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-devel-0.11.11-11.el4.i386.rpm SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba
vte-devel-0.11.11-11.el4.i386.rpm SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba

Red Hat Enterprise Linux Workstation 4

SRPM
vte-0.11.11-11.el4.src.rpm SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529
x86_64
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.x86_64.rpm SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766
vte-devel-0.11.11-11.el4.x86_64.rpm SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa
ia64
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.ia64.rpm SHA-256: fc1eb685b5179f38027bff95bfe55baab8b9221aee56b97faf138d7703640236
vte-devel-0.11.11-11.el4.ia64.rpm SHA-256: f151b0d7f00060c6e8014ee3395571faebdcc81547fdcb91607737463ff57d9a
i386
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-devel-0.11.11-11.el4.i386.rpm SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba

Red Hat Enterprise Linux Desktop 4

SRPM
vte-0.11.11-11.el4.src.rpm SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529
x86_64
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-0.11.11-11.el4.x86_64.rpm SHA-256: cbcd8e5b5e955789b11580ec576b2f377cec158128f4569658cc8b396a324766
vte-devel-0.11.11-11.el4.x86_64.rpm SHA-256: 19edea196d2c51c9ab7b4e5f20810e54215d269d64bf167e2282e39cba7de6aa
i386
vte-0.11.11-11.el4.i386.rpm SHA-256: 8b06614997289e216ba5fec37d36e2cb74921f192ad4c7951efa042d399e56ab
vte-devel-0.11.11-11.el4.i386.rpm SHA-256: f19c29dcf85a9b8f8c8f0abdeb6343486203dd1299a3ac6cc2c55ef5c503a2ba

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
vte-0.11.11-11.el4.src.rpm SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529
s390x
vte-0.11.11-11.el4.s390.rpm SHA-256: 1a248c8a01c1dc8290f06a497055fd4f020c3d6ec84cf8f502db12821454ba49
vte-0.11.11-11.el4.s390x.rpm SHA-256: 71a9cd1df7905da57c9c6f166475b7521590e0a3e7740a11ba93440ea7916903
vte-devel-0.11.11-11.el4.s390x.rpm SHA-256: 6153ffce2ad07c3f736e173b9f2c9ba3760a785d8e41d1b3f97e373331e49dc6
s390
vte-0.11.11-11.el4.s390.rpm SHA-256: 1a248c8a01c1dc8290f06a497055fd4f020c3d6ec84cf8f502db12821454ba49
vte-devel-0.11.11-11.el4.s390.rpm SHA-256: 98ab2abf0bd73585875b64eeeef0a5a931d6e4916abb723462f588064db0d25c

Red Hat Enterprise Linux for Power, big endian 4

SRPM
vte-0.11.11-11.el4.src.rpm SHA-256: fa1af71ac2babf8e407fceb7de148cfd35f127013badb6fe17047910146a5529
ppc
vte-0.11.11-11.el4.ppc.rpm SHA-256: 9f1e1ab05f1a148a87eaa05fb03c44b4e0440bc96377a76d2d78ce415f96c582
vte-0.11.11-11.el4.ppc64.rpm SHA-256: 9ada154e543952243876b785a081c8c0cadea6d8ae752c15966eacd9614e6630
vte-devel-0.11.11-11.el4.ppc.rpm SHA-256: 1e87ec25d6aa78e8768861ab530b6db6f4498c84bcccc487f650a8df76ce0280

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility