Skip to navigation

Bug Fix Advisory linuxwacom bug fix update

Advisory: RHBA-2012:1271-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-09-17
Last updated on: 2012-09-17
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated linuxwacom packages that fix a bug are now available for Red Hat
Enterprise Linux 5.

The linuxwacom package contains the drivers, libraries, and documentation for
configuring and running Wacom tablets under the Linux operating system. It
contains diagnostic applications as well as X.org XInput drivers.

This update fixes the following bug:

* Due to a regression, when a Wacom tablet was used with only a lens cursor
device attached to it for input, the lens cursor could not be moved. This update
fixes this bug and lens cursor devices now work as expected in the described
scenario. (BZ#843859)

Users of linuxwacom are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
linuxwacom-0.7.8.3-11.2.el5_8.src.rpm     MD5: 09a8d06397ad89c04017195942631dec
SHA-256: 77711e3789d23222f98c240c964a688a0d4b4ec1712d17323f29bcd30efa02f4
 
IA-32:
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 9e2f60ab75f3638f88001baba0d647af
SHA-256: f308512aefd92210c9d6542da1a657437a445db15a0ea16cf10597a5e9402e28
linuxwacom-devel-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 2c1aa7ba4e939e37dd6b3ec78c3c4d2a
SHA-256: 65a685c136092c826ac1226a7028757bf445f1dc34f1f4c597c75aec53e3af11
 
x86_64:
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 9e2f60ab75f3638f88001baba0d647af
SHA-256: f308512aefd92210c9d6542da1a657437a445db15a0ea16cf10597a5e9402e28
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: e1b98f622b12d763898faefcfb3ffc32
SHA-256: ff42b0b34ee81ef3d49f689a698cf65ed941c73a62e897c5aec4d2dbca42f8e1
linuxwacom-devel-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 2c1aa7ba4e939e37dd6b3ec78c3c4d2a
SHA-256: 65a685c136092c826ac1226a7028757bf445f1dc34f1f4c597c75aec53e3af11
linuxwacom-devel-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: 24defff6218d8f90d7d871eaab5182b6
SHA-256: 05db450a9772314f394bc469dadec9880ce3f5bd4e37f9724921a604fef73155
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
linuxwacom-0.7.8.3-11.2.el5_8.src.rpm     MD5: 09a8d06397ad89c04017195942631dec
SHA-256: 77711e3789d23222f98c240c964a688a0d4b4ec1712d17323f29bcd30efa02f4
 
IA-32:
linuxwacom-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 03da98c1748e028182a298e5f54abe53
SHA-256: acfff39978339fcec8656d341b8aa1210969ba52747baf61b96bbcf0e8593ba3
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 9e2f60ab75f3638f88001baba0d647af
SHA-256: f308512aefd92210c9d6542da1a657437a445db15a0ea16cf10597a5e9402e28
linuxwacom-devel-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 2c1aa7ba4e939e37dd6b3ec78c3c4d2a
SHA-256: 65a685c136092c826ac1226a7028757bf445f1dc34f1f4c597c75aec53e3af11
 
IA-64:
linuxwacom-0.7.8.3-11.2.el5_8.ia64.rpm     MD5: ce07e0bd656a2f7ece9eddf0b0061637
SHA-256: 0c56463b8f5ddb1d9f5fea5a1d4efec5f41fe855b36d01e2e8a98565d5f56ec5
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.ia64.rpm     MD5: ab0ab3e82e09bac7eff205c04353d5ad
SHA-256: a2688e0b1595d587ad044a042d3de7e80a6d9e209b14df8e374bf1b61c8fedbe
linuxwacom-devel-0.7.8.3-11.2.el5_8.ia64.rpm     MD5: df66435b48b0aad5cca65f119319c13c
SHA-256: bf98595dd6810c36d82400cb7247d6f507bac557646c21a53e7747d88f35432f
 
PPC:
linuxwacom-0.7.8.3-11.2.el5_8.ppc.rpm     MD5: a13bc8d4c5f849b36f4748d45f4f0ebb
SHA-256: 8e7fffbe4ac59659f4d9123beb647ba37fec91694cef4c3097d91e7919d9f4fb
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.ppc.rpm     MD5: 462299b25814371f270a37004d72e54c
SHA-256: 7b275304084f406779d4c8cacf64ee95ffd20b01458efd46ab0c961c4f6ceec0
linuxwacom-devel-0.7.8.3-11.2.el5_8.ppc.rpm     MD5: 22991fdccd65f14d4df20bc4add93049
SHA-256: a1ae91139d19ad01e5bd5ee8596f2a33fbe15455216fd46453605c0b653d4e1e
 
x86_64:
linuxwacom-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: 6c9208a717ad16b5c86b668f0f8fcff9
SHA-256: 330cbb9052a03a95e7a1cf3055912e57162465b32ac030d5fa56be6f28901bc8
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 9e2f60ab75f3638f88001baba0d647af
SHA-256: f308512aefd92210c9d6542da1a657437a445db15a0ea16cf10597a5e9402e28
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: e1b98f622b12d763898faefcfb3ffc32
SHA-256: ff42b0b34ee81ef3d49f689a698cf65ed941c73a62e897c5aec4d2dbca42f8e1
linuxwacom-devel-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 2c1aa7ba4e939e37dd6b3ec78c3c4d2a
SHA-256: 65a685c136092c826ac1226a7028757bf445f1dc34f1f4c597c75aec53e3af11
linuxwacom-devel-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: 24defff6218d8f90d7d871eaab5182b6
SHA-256: 05db450a9772314f394bc469dadec9880ce3f5bd4e37f9724921a604fef73155
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
linuxwacom-0.7.8.3-11.2.el5_8.src.rpm     MD5: 09a8d06397ad89c04017195942631dec
SHA-256: 77711e3789d23222f98c240c964a688a0d4b4ec1712d17323f29bcd30efa02f4
 
IA-32:
linuxwacom-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 03da98c1748e028182a298e5f54abe53
SHA-256: acfff39978339fcec8656d341b8aa1210969ba52747baf61b96bbcf0e8593ba3
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.i386.rpm     MD5: 9e2f60ab75f3638f88001baba0d647af
SHA-256: f308512aefd92210c9d6542da1a657437a445db15a0ea16cf10597a5e9402e28
 
x86_64:
linuxwacom-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: 6c9208a717ad16b5c86b668f0f8fcff9
SHA-256: 330cbb9052a03a95e7a1cf3055912e57162465b32ac030d5fa56be6f28901bc8
linuxwacom-debuginfo-0.7.8.3-11.2.el5_8.x86_64.rpm     MD5: e1b98f622b12d763898faefcfb3ffc32
SHA-256: ff42b0b34ee81ef3d49f689a698cf65ed941c73a62e897c5aec4d2dbca42f8e1
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/