Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:1366 - Bug Fix Advisory
Issued:
2013-09-30
Updated:
2013-09-30

RHBA-2013:1366 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

gtk2 bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gtk2 packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Description

GIMP Toolkit (GTK+) is a multi-platform toolkit for creating graphical user
interfaces.

This update fixes the following bug:

  • Previously, a post-installation process error occurred when updating GTK2 on

systems using Itanium processors due to an incorrect usage of hard coded paths
that were not translated correctly on the Itanium architecture. This update
corrects the errors in the hard coded paths, and it is now possible to update
GTK2 on Itanium processors. (BZ#649682)

Users of gtk2 are advised to upgrade to these updated packages, which fix this
bug.

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 649682 - post-install process error when updating gtk2 on ia64

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
x86_64
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-2.10.4-30.el5.x86_64.rpm SHA-256: cf0eec88a3bc99a21ce80ff290edf9ead17c8f5a078ff3a4ec575489e8059f2a
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.x86_64.rpm SHA-256: b4c7351ddc0ad10a2d06150542e068b79dd0c1224ef8c45b789943ab92307525
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c
gtk2-devel-2.10.4-30.el5.x86_64.rpm SHA-256: 8a748a1958ceee330e5866a3314b5a776b0437c597bd70431d2fee0832a956a6
ia64
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-2.10.4-30.el5.ia64.rpm SHA-256: 235366fb02434aae67ac5cd1f2da752cd1f15bf25ab9e0b33bc40063371f6adb
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.ia64.rpm SHA-256: 513acce3fc26dc219459d1a7d77741ffb5d1b051c5326bc4ba1937c3441b2339
gtk2-devel-2.10.4-30.el5.ia64.rpm SHA-256: 39c8118977c1bfd32b1e99fac8e764a793ed8d6424f269e5479630b5807092a1
i386
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c

Red Hat Enterprise Linux Workstation 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
x86_64
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-2.10.4-30.el5.x86_64.rpm SHA-256: cf0eec88a3bc99a21ce80ff290edf9ead17c8f5a078ff3a4ec575489e8059f2a
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.x86_64.rpm SHA-256: b4c7351ddc0ad10a2d06150542e068b79dd0c1224ef8c45b789943ab92307525
gtk2-debuginfo-2.10.4-30.el5.x86_64.rpm SHA-256: b4c7351ddc0ad10a2d06150542e068b79dd0c1224ef8c45b789943ab92307525
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c
gtk2-devel-2.10.4-30.el5.x86_64.rpm SHA-256: 8a748a1958ceee330e5866a3314b5a776b0437c597bd70431d2fee0832a956a6
i386
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c

Red Hat Enterprise Linux Desktop 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
x86_64
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-2.10.4-30.el5.x86_64.rpm SHA-256: cf0eec88a3bc99a21ce80ff290edf9ead17c8f5a078ff3a4ec575489e8059f2a
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.x86_64.rpm SHA-256: b4c7351ddc0ad10a2d06150542e068b79dd0c1224ef8c45b789943ab92307525
i386
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
s390x
gtk2-2.10.4-30.el5.s390.rpm SHA-256: ff7bdb26624b95d4aeca6fd5161ba7d819654b50b32286822e871630276591e7
gtk2-2.10.4-30.el5.s390x.rpm SHA-256: 823237d7ec84fcbb8b0d81af4c9fe7d4f72ecdee0098548ea091f0a05c68c790
gtk2-debuginfo-2.10.4-30.el5.s390.rpm SHA-256: 547d7fcd19ed10cb500b7fae3d8e01814a54230a63cc7f9ed8ed23e747de2da9
gtk2-debuginfo-2.10.4-30.el5.s390x.rpm SHA-256: d53f5329e2e899b5eac1837033c81b783a4e0f6c4d2fdb758dbe5c39da3bfcad
gtk2-devel-2.10.4-30.el5.s390.rpm SHA-256: c3788e452fe6cbfe079dc70c28f16079a0409501d1bcbcee499c6009d6b9e0e3
gtk2-devel-2.10.4-30.el5.s390x.rpm SHA-256: ff34a7daa9b9477c4f4af95446a7ccb53af0ba81f53f60bce17eaa9670f4bae9

Red Hat Enterprise Linux for Power, big endian 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
ppc
gtk2-2.10.4-30.el5.ppc.rpm SHA-256: 5f4b45a4246242c01a7e5aafa0bff1f17709616ccf4ac67d989ba714c52eb614
gtk2-2.10.4-30.el5.ppc64.rpm SHA-256: 6497bd0c44276ab58338dec88690e1844c40666b7d2dbe6221b4ccad59eba5a3
gtk2-debuginfo-2.10.4-30.el5.ppc.rpm SHA-256: 467ba69f46828e0ae96cfc343657103bb2883960e4d12e9f62913821063af597
gtk2-debuginfo-2.10.4-30.el5.ppc64.rpm SHA-256: 8c94c3123132a844d8eee582100339a5ac44223de2181b99c2f2ac27b03fe734
gtk2-devel-2.10.4-30.el5.ppc.rpm SHA-256: 061183f42660b2c2f62ffa85db6d0827422918b40cbaee8d32a12da8d948ba4b
gtk2-devel-2.10.4-30.el5.ppc64.rpm SHA-256: 9cb71bfa068ded4ad93cb96918093650f2ee4f27818799c264a8f9bee1e6c5d4

Red Hat Enterprise Linux Server from RHUI 5

SRPM
gtk2-2.10.4-30.el5.src.rpm SHA-256: 7a51f8e6cbf8e60c1f314a04888f73a2476d22eff7276e40d12b89b18119f7bd
x86_64
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-2.10.4-30.el5.x86_64.rpm SHA-256: cf0eec88a3bc99a21ce80ff290edf9ead17c8f5a078ff3a4ec575489e8059f2a
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-debuginfo-2.10.4-30.el5.x86_64.rpm SHA-256: b4c7351ddc0ad10a2d06150542e068b79dd0c1224ef8c45b789943ab92307525
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c
gtk2-devel-2.10.4-30.el5.x86_64.rpm SHA-256: 8a748a1958ceee330e5866a3314b5a776b0437c597bd70431d2fee0832a956a6
i386
gtk2-2.10.4-30.el5.i386.rpm SHA-256: ccd49c00fcb183a230380f5f579912264bde9e9b9b55dc8ed9497b3eba6db6e2
gtk2-debuginfo-2.10.4-30.el5.i386.rpm SHA-256: 83835ec81a0f4a63b3431d164bcc975b0418a44859321e4789f6203a08d9e953
gtk2-devel-2.10.4-30.el5.i386.rpm SHA-256: ee1871d143c36205a8b63ceea8c672570691680a86a7b87174cfd1eef236289c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility