Skip to navigation

Bug Fix Advisory gtk+ bug fix update

Advisory: RHBA-2013:0108-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated gtk+ packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The gtk+ packages provide a multi-platform toolkit for creating graphical user
interfaces.

This update fixes the following bug:

* Using a Wacom tablet with a dual head configuration caused an error in the
GTK+ toolkit when the input coordinates of the Wacom tablet were bound to a
single monitor. Consequently, drawing with a pen with pressure sensitivity
enabled led to an offset between the pen position and the content drawn on the
screen. This update changes the way that input coordinates are translated by the
library in this specific case. (BZ#694888)

All users of GTK+ are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
gtk+-1.2.10-57.el5.src.rpm     MD5: aa6dc35f28a197c5fa3995e39f3b1d55
SHA-256: 9ea6dde24bb9342e38467994450df4cbbcd6e5f16600e2eaa0c1268fcaa64d4c
 
IA-32:
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-devel-1.2.10-57.el5.i386.rpm     MD5: c0603fb113c328501aa51785b35ab14d
SHA-256: db42b6fc6386ad8185bd041deaaa331858614cf02bbdf3858b0691c360b2fb4c
 
x86_64:
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-debuginfo-1.2.10-57.el5.x86_64.rpm     MD5: 8a42a2d89ae9fbcae7f658e6ff44cfaa
SHA-256: baab91308c0b3e8dd702c7178aab6f3a040bf08a3fc382d08b8500e5450dc295
gtk+-devel-1.2.10-57.el5.i386.rpm     MD5: c0603fb113c328501aa51785b35ab14d
SHA-256: db42b6fc6386ad8185bd041deaaa331858614cf02bbdf3858b0691c360b2fb4c
gtk+-devel-1.2.10-57.el5.x86_64.rpm     MD5: c5d27e781a77d672a796e31eecdb384c
SHA-256: 9d078e04e72ea6ae6a59a946e0d723fd9e3bc3a2bf6584a72884578936179169
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gtk+-1.2.10-57.el5.src.rpm     MD5: aa6dc35f28a197c5fa3995e39f3b1d55
SHA-256: 9ea6dde24bb9342e38467994450df4cbbcd6e5f16600e2eaa0c1268fcaa64d4c
 
IA-32:
gtk+-1.2.10-57.el5.i386.rpm     MD5: a95eb2c5a54776df4e929780ef842cb6
SHA-256: 396daf063b32e2bb973be8e904043e2cdfd7a826c4efb5bc47b37334f62e0847
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-devel-1.2.10-57.el5.i386.rpm     MD5: c0603fb113c328501aa51785b35ab14d
SHA-256: db42b6fc6386ad8185bd041deaaa331858614cf02bbdf3858b0691c360b2fb4c
 
IA-64:
gtk+-1.2.10-57.el5.i386.rpm     MD5: a95eb2c5a54776df4e929780ef842cb6
SHA-256: 396daf063b32e2bb973be8e904043e2cdfd7a826c4efb5bc47b37334f62e0847
gtk+-1.2.10-57.el5.ia64.rpm     MD5: b1ac1e5bf0bb777f64f88f8e718a60d7
SHA-256: fb10178ccc947dd73886c16e583fb64e5d19626d561783f77b318835c7287e44
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-debuginfo-1.2.10-57.el5.ia64.rpm     MD5: 117701b42d8252ab6501041d43b3b8fa
SHA-256: a52496d71a68341400dae72345adc830623238e754d48d2a0048fa804e823a5e
gtk+-devel-1.2.10-57.el5.ia64.rpm     MD5: cdff2ce35649a9046590982c1ce22798
SHA-256: f3b4940b817cd16afd0f1f3ac6f8eb6f43e884016f6ffeaac95beeaec17ae11e
 
PPC:
gtk+-1.2.10-57.el5.ppc.rpm     MD5: 91f37cdc1f62ad27b703467f7cc160a8
SHA-256: 10745f14457302383cee7cab3f40a00c76d0c237f913e363b11ce88ee7ef0ea4
gtk+-1.2.10-57.el5.ppc64.rpm     MD5: ebdba9081575d4fe965c6c181c0f1c34
SHA-256: 769bfeb396fc3c9151020a0b3ad0ad7feeb29f82a93e7d895225f212a81d70fc
gtk+-debuginfo-1.2.10-57.el5.ppc.rpm     MD5: e797de1209bff34eec135880370b7b20
SHA-256: b1a89ff9caf977cb1001c92f5304d2a966edf49cdfbd49412366aecba77a4d11
gtk+-debuginfo-1.2.10-57.el5.ppc64.rpm     MD5: daaceb5079909bdf8b359accc788fa6e
SHA-256: 209c083ef843e97eba6b7bbb286e871765693318d3c755a37e665aacfb49804f
gtk+-devel-1.2.10-57.el5.ppc.rpm     MD5: 85dfb48b0036fbd29d9f41a12d6888d6
SHA-256: 0cff539568efd5109fd0aa67ff82e2a01bff5a8bfb401f78d91ee619eddcd4b4
gtk+-devel-1.2.10-57.el5.ppc64.rpm     MD5: 367de75acdbe2cf2465b9c98e26f5242
SHA-256: 8ffb2741d60423ee36a6e0b7de50de229e77faf45a48ba8ef9ff9b658858a051
 
s390x:
gtk+-1.2.10-57.el5.s390.rpm     MD5: b5ff0280d1d29434e3f0c92e4fb29d5c
SHA-256: 871bb7d2f93d2084535a22147256b9a49fdd9384daccc009eddc8f99a71eaeb1
gtk+-1.2.10-57.el5.s390x.rpm     MD5: da69f7eeebe37713ee9cf5d3c2590d49
SHA-256: 567a6c32e6cea9ca2eeca6babf6b702ffa1a5ca7b9b95415325b1dc77617fc1c
gtk+-debuginfo-1.2.10-57.el5.s390.rpm     MD5: 42aac1b4451b665393271ae9f810c727
SHA-256: 8729e3baab41bd2171425460eb34cec8df08275ac6ef78c8d476b7a6f2bbdc24
gtk+-debuginfo-1.2.10-57.el5.s390x.rpm     MD5: 7e6fcb94d98b9f5fad8fd9b194b23b3f
SHA-256: 66690bb5cac4b2d0b458d80f5373ce0b7a2bf90f6c6459ec3472f58f1062520a
gtk+-devel-1.2.10-57.el5.s390.rpm     MD5: cc38cc1827576fda177147272296dc69
SHA-256: 1f9125fe0ce73f80f028be404a46e6d9a34f04935396ca67dd3fedc82797957a
gtk+-devel-1.2.10-57.el5.s390x.rpm     MD5: 7189477879520c437bb9456797064fcb
SHA-256: 31dedbad3f64d348a3cfd91863ffbfff3da2bb8ebb74f453e4ddd9aba4fad6a6
 
x86_64:
gtk+-1.2.10-57.el5.i386.rpm     MD5: a95eb2c5a54776df4e929780ef842cb6
SHA-256: 396daf063b32e2bb973be8e904043e2cdfd7a826c4efb5bc47b37334f62e0847
gtk+-1.2.10-57.el5.x86_64.rpm     MD5: 43bb31fe70fe7fd53077cfeb5938b9fe
SHA-256: 296d741ea058fd590a75ea7c9628e6bd9cfa3cb68b55a8848007726967201ce0
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-debuginfo-1.2.10-57.el5.x86_64.rpm     MD5: 8a42a2d89ae9fbcae7f658e6ff44cfaa
SHA-256: baab91308c0b3e8dd702c7178aab6f3a040bf08a3fc382d08b8500e5450dc295
gtk+-devel-1.2.10-57.el5.i386.rpm     MD5: c0603fb113c328501aa51785b35ab14d
SHA-256: db42b6fc6386ad8185bd041deaaa331858614cf02bbdf3858b0691c360b2fb4c
gtk+-devel-1.2.10-57.el5.x86_64.rpm     MD5: c5d27e781a77d672a796e31eecdb384c
SHA-256: 9d078e04e72ea6ae6a59a946e0d723fd9e3bc3a2bf6584a72884578936179169
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gtk+-1.2.10-57.el5.src.rpm     MD5: aa6dc35f28a197c5fa3995e39f3b1d55
SHA-256: 9ea6dde24bb9342e38467994450df4cbbcd6e5f16600e2eaa0c1268fcaa64d4c
 
IA-32:
gtk+-1.2.10-57.el5.i386.rpm     MD5: a95eb2c5a54776df4e929780ef842cb6
SHA-256: 396daf063b32e2bb973be8e904043e2cdfd7a826c4efb5bc47b37334f62e0847
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
 
x86_64:
gtk+-1.2.10-57.el5.i386.rpm     MD5: a95eb2c5a54776df4e929780ef842cb6
SHA-256: 396daf063b32e2bb973be8e904043e2cdfd7a826c4efb5bc47b37334f62e0847
gtk+-1.2.10-57.el5.x86_64.rpm     MD5: 43bb31fe70fe7fd53077cfeb5938b9fe
SHA-256: 296d741ea058fd590a75ea7c9628e6bd9cfa3cb68b55a8848007726967201ce0
gtk+-debuginfo-1.2.10-57.el5.i386.rpm     MD5: 81ae9e7070479d65ee2ee6cd21f26d28
SHA-256: 44ea23c5526d655dda587c6bf013f11920045249a8b0d5cf9b78bf4fa524bacf
gtk+-debuginfo-1.2.10-57.el5.x86_64.rpm     MD5: 8a42a2d89ae9fbcae7f658e6ff44cfaa
SHA-256: baab91308c0b3e8dd702c7178aab6f3a040bf08a3fc382d08b8500e5450dc295
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/