Updated virt-viewer packages that fix one bug are now available for Red HatEnterprise Linux 6.

The virt-viewer packages provide Virtual Machine Viewer, which is a lightweightinterface for interacting with the graphical display of a virtualized guest.Virtual Machine Viewer uses libvirt and is intended as a replacement fortraditional VNC or SPICE clients. The Simple Protocol for Independent ComputingEnvironments (SPICE) is a remote display protocol designed for virtualenvironments. This update fixes the following bug: * Prior to this update, the virt-viewer utility did not properly supportautomatic configuration of resolution. Consequently, when a virt-viewer consolewas launched from the Red Hat Enterprise Virtualization user portal with the”Native Client” invocation method and the “Open in Full Screen” option wasselected, the displays of the guest virtual machine were not always configuredto match the client displays. With this update, auto-configuration of resolutionfor full-screen mode has been implemented and virt-viewer now shows afull-screen guest display for each client monitor. (BZ#1092871)Users of virt-viewer are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
IA-32:
virt-viewer-0.5.6-8.el6_5.3.i686.rpm
    MD5: d1c2ec1ca82c4a52a5202413798790d1SHA-256: e9285968544e5d5dac3f0c4541d72cda4da7abd88c0272c3b6a0d29bbc071b87
virt-viewer-debuginfo-0.5.6-8.el6_5.3.i686.rpm
    MD5: a5c1eae7b77df0e90a1d8ba2c2670d27SHA-256: 1e5111f67c924c6c28bb503300460bda08f330ec3e252982f84031c4acfb5fa0
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
IA-32:
virt-viewer-0.5.6-8.el6_5.3.i686.rpm
    MD5: d1c2ec1ca82c4a52a5202413798790d1SHA-256: e9285968544e5d5dac3f0c4541d72cda4da7abd88c0272c3b6a0d29bbc071b87
virt-viewer-debuginfo-0.5.6-8.el6_5.3.i686.rpm
    MD5: a5c1eae7b77df0e90a1d8ba2c2670d27SHA-256: 1e5111f67c924c6c28bb503300460bda08f330ec3e252982f84031c4acfb5fa0
 
PPC:
virt-viewer-0.5.6-8.el6_5.3.ppc64.rpm
    MD5: 9c01a7de77e0a82113d42ba94aba1d75SHA-256: c86312fc8533d00dcef2f001430ac9e26a91b5c6f812007ab9842524e0b01d17
virt-viewer-debuginfo-0.5.6-8.el6_5.3.ppc64.rpm
    MD5: ad73ce573b2220b5b6db2d425d95887cSHA-256: d7d409458cdb3ff00bb35efa2e2a683eb310e10be2d2b0efba36bbc1f909314b
 
s390x:
virt-viewer-0.5.6-8.el6_5.3.s390x.rpm
    MD5: c0ead7789b47df97a277dbe6aabdcf46SHA-256: b3ab4b23c21318215664656ff77c692e2c4d279b6a27f0c69d640524bf5e47e4
virt-viewer-debuginfo-0.5.6-8.el6_5.3.s390x.rpm
    MD5: 8c9f60e1b16ff35c66d1fa9f9fe1832bSHA-256: 765fcf109a35b96720d458836503e101fe97dffa894317d592b66850c15a96c2
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
IA-32:
virt-viewer-0.5.6-8.el6_5.3.i686.rpm
    MD5: d1c2ec1ca82c4a52a5202413798790d1SHA-256: e9285968544e5d5dac3f0c4541d72cda4da7abd88c0272c3b6a0d29bbc071b87
virt-viewer-debuginfo-0.5.6-8.el6_5.3.i686.rpm
    MD5: a5c1eae7b77df0e90a1d8ba2c2670d27SHA-256: 1e5111f67c924c6c28bb503300460bda08f330ec3e252982f84031c4acfb5fa0
 
PPC:
virt-viewer-0.5.6-8.el6_5.3.ppc64.rpm
    MD5: 9c01a7de77e0a82113d42ba94aba1d75SHA-256: c86312fc8533d00dcef2f001430ac9e26a91b5c6f812007ab9842524e0b01d17
virt-viewer-debuginfo-0.5.6-8.el6_5.3.ppc64.rpm
    MD5: ad73ce573b2220b5b6db2d425d95887cSHA-256: d7d409458cdb3ff00bb35efa2e2a683eb310e10be2d2b0efba36bbc1f909314b
 
s390x:
virt-viewer-0.5.6-8.el6_5.3.s390x.rpm
    MD5: c0ead7789b47df97a277dbe6aabdcf46SHA-256: b3ab4b23c21318215664656ff77c692e2c4d279b6a27f0c69d640524bf5e47e4
virt-viewer-debuginfo-0.5.6-8.el6_5.3.s390x.rpm
    MD5: 8c9f60e1b16ff35c66d1fa9f9fe1832bSHA-256: 765fcf109a35b96720d458836503e101fe97dffa894317d592b66850c15a96c2
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
virt-viewer-0.5.6-8.el6_5.3.src.rpm
    MD5: f4ca2e9a17fb017a02dd6b8a85728ffdSHA-256: 27050ac5f974d114ce33a2329c6ec30b3ced10d0e119a4ad579b44e2ffd93607
 
IA-32:
virt-viewer-0.5.6-8.el6_5.3.i686.rpm
    MD5: d1c2ec1ca82c4a52a5202413798790d1SHA-256: e9285968544e5d5dac3f0c4541d72cda4da7abd88c0272c3b6a0d29bbc071b87
virt-viewer-debuginfo-0.5.6-8.el6_5.3.i686.rpm
    MD5: a5c1eae7b77df0e90a1d8ba2c2670d27SHA-256: 1e5111f67c924c6c28bb503300460bda08f330ec3e252982f84031c4acfb5fa0
 
x86_64:
virt-viewer-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: d16a7aa5ec8ef22130fca8b0555fdd39SHA-256: 30d55dd1a36e16879d0c79e22c173b59b417033c2b896aeb66ce2a53dfa2ce41
virt-viewer-debuginfo-0.5.6-8.el6_5.3.x86_64.rpm
    MD5: 9642bcb76c13329bd5bccc4c8199c800SHA-256: 25e360479b6e43ecc9d2f711f05676a7428173e0fbf9168efacea50de50c7652
 
(The unlinked packages above are only available from the Red Hat Network)
1092871 – virt-viewer doesn’t automatically adjust resolution when opened fullscreen via vv-file

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply