- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0130 - Bug Fix Advisory
Synopsis
metacity bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated metacity packages that address two bugs are now available.
Description
Metacity is a simple window manager that integrates with GNOME 2.
The two bugs addressed in this update are:
- when "focus follows mouse" was active (that is, the "Select windows when
the mouse moves over them" check-box in System > Preferences > Windows was
checked), spurious "crossing events" were generated. (A crossing event is
generated when the mouse pointer crosses the boundary between one
user-interface widget and another.) These events caused Xt to treat
double-clicks as separate clicks, each owned by a different widget. In
applications built with Motif widgets, this caused double-clicks to not
work.
With this update, double-clicking with "focus follows mouse" active can be
made to work with Motif-based applications by changing metacity's "raise on
click" setting from true (the default setting) to false. To do this run the
following command:
gconftool-2 --type bool -s /apps/metacity/general/raise_on_click "false"
Alternatively, run "gconf-editor" and click the Value check-box for the
/apps/metacity/general/raise_on_click key. This switches the setting from
true to false.
Note: it is not possible to make double-clicks into Motif-based
applications work with both "focus follows mouse" and "raise on click"
active. In the previous release, however, double-clicks into Motif-based
applications would fail even if "raise on click" was disabled.
- metacity set the state of newly-launched application windows to normal.
This caused applications started so as to initially appear in a minimized
state (for example, applications started with the "-iconic" switch) to not,
in fact, appear as minimized icons. With this update, metacity checks the
state of new windows and leaves initially minimized windows in their
minimized state.
All metacity users are advised to upgrade to this new release, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 442769 - Double-Click does not work with Metacity Window Manager and Motif with certain WM preference settings
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
x86_64 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
metacity-2.16.0-12.el5.x86_64.rpm | SHA-256: b84da766fae11efaaefa8fbf1d152d7f7a1b1394ad023674be900ce226b4996d |
ia64 | |
metacity-2.16.0-12.el5.ia64.rpm | SHA-256: bd88b6b0736bcfd012cf9831bb0bacdfb4c1f215bdf5500b4f146371d4db37df |
i386 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
x86_64 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
metacity-2.16.0-12.el5.x86_64.rpm | SHA-256: b84da766fae11efaaefa8fbf1d152d7f7a1b1394ad023674be900ce226b4996d |
i386 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
x86_64 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
metacity-2.16.0-12.el5.x86_64.rpm | SHA-256: b84da766fae11efaaefa8fbf1d152d7f7a1b1394ad023674be900ce226b4996d |
i386 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
s390x | |
metacity-2.16.0-12.el5.s390.rpm | SHA-256: 7130ebc2b3ceeb7d0cba6cbb6379c96a0145aced28efd254ae8a1037a979276e |
metacity-2.16.0-12.el5.s390x.rpm | SHA-256: 31d8b2ed63e432e3795e14eb0b336b91c9c53095ddced239c1007ce6948f006f |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
ppc | |
metacity-2.16.0-12.el5.ppc.rpm | SHA-256: 89bcd3bfb1be1e9427adb2adf573a2474c7d8dc8f7918a4a59d9bb4ff76df1b8 |
metacity-2.16.0-12.el5.ppc64.rpm | SHA-256: 16fdd7762a2024b27647d70804d0245911daf42772e0e4e6f47e17ddf2581e24 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
metacity-2.16.0-12.el5.src.rpm | SHA-256: 0a58055b71f0b0797600fb731b88c4c927d3e891eaeca9fb43458ed3e5520ce8 |
x86_64 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
metacity-2.16.0-12.el5.x86_64.rpm | SHA-256: b84da766fae11efaaefa8fbf1d152d7f7a1b1394ad023674be900ce226b4996d |
i386 | |
metacity-2.16.0-12.el5.i386.rpm | SHA-256: 7a52f3e9806fb67443c696d2204f653b0b0420cb21d575905a364e56923748d9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.