Bug 2175732

Summary: Rebase Tigervnc to 1.13.1
Product: Red Hat Enterprise Linux 9 Reporter: Jan Grulich <jgrulich>
Component: tigervncAssignee: Jan Grulich <jgrulich>
Status: CLOSED ERRATA QA Contact: Radek Duda <rduda>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.2CC: tpelka
Target Milestone: rcKeywords: Triaged
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: tigervnc-1.13.1-1.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-11-07 08:25:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jan Grulich 2023-03-06 12:52:41 UTC
A new version of TigerVNC (1.13.1) is released, bringing fixes and improvements collected from the past year as latest release was in November 2021.

Notable changes:

The native viewer now supports RealVNC's RSA-AES authentication methods
The native viewer is now translated to Romanian and Georgian
The native viewer now (optionally) supports PiKVM's H.264 encoding
The display settings for the native viewer have been overhauled to make them easier to understand
The native viewer now supports adding exceptions for expired certificates
Resolved an issue where full-screen mode didn't work in the native viewer on macOS 13
Lock key synchronization has been re-enabled in the native viewer after being accidentally disabled in 1.11.0
Xvnc/libvnc.so can now be built with Xorg 1.21
x0vncserver is a bit better at handling differing server and client keyboard layout
x0vncserver now correctly handles zaphod mode

Comment 7 errata-xmlrpc 2023-11-07 08:25:11 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (tigervnc bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:6347