[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#688908: marked as done (xserver-xorg-core 1.12.3.902-1 breaks icewm)



Your message dated Sun, 30 Sep 2012 12:17:58 +0000
with message-id <E1TIIT8-0007xZ-IS@franck.debian.org>
and subject line Bug#688908: fixed in xorg-server 2:1.12.4-1
has caused the Debian Bug report #688908,
regarding xserver-xorg-core 1.12.3.902-1 breaks icewm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
688908: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688908
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: xserver-xorg-core
Version: 2:1.12.3.902-1
Severity: normal

Hi there,

upgrading xserver-xorg-core from 2:1.12.3-1 to 2:1.12.3.902-1
breaks the icewm window manager. After the upgrade the title
bars of windows are partly broken and become transparent at
the part where normally the window title would be printed.

For illustration I have uploaded two screenshot (parts),
both showing the correct behaviour with old version and the
broken one with new version. As you can see in the new version
the window actually does not cover the titlebar parts in 
question, but instead letting the content below shine through.

Please see: http://imgur.com/a/5tyiI


Regards, 
Michael

--- End Message ---
--- Begin Message ---
Source: xorg-server
Source-Version: 2:1.12.4-1

We believe that the bug you reported is fixed in the latest version of
xorg-server, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 688908@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <jcristau@debian.org> (supplier of updated xorg-server package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 30 Sep 2012 12:47:00 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx xdmx-tools xnest xvfb xserver-xephyr xserver-xfbdev xserver-xorg-core-dbg xserver-common
Architecture: source all amd64
Version: 2:1.12.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Description: 
 xdmx       - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest      - Nested X server
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xfbdev - Linux framebuffer device tiny X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-dbg - Xorg - the X.Org X server (debugging symbols)
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xvfb       - Virtual Framebuffer 'fake' X server
Closes: 686152 686153 687268 688908
Changes: 
 xorg-server (2:1.12.4-1) unstable; urgency=low
 .
   * New upstream stable release.
   * int10: fix pci_device_read_rom usage (closes: #686153).  Thanks, Stephan
     Schreiber!
   * Revert 'Unload submodules' (closes: #686152).  Seems to introduce a
     regression, let's try that again later.  Thanks, Stephan Schreiber!
   * Revert "fb: reorder Bresenham error correction to avoid overshoot".  Fixes
     regression introduced in 1.12.3.902 (fdo#54168, closes: #688908)
   * Add conflicts against obsolete evtouch input driver (hopefully closes:
     #687268)
Checksums-Sha1: 
 fa42149680f8e0e1f3d002090f6efd001818a21b 4095 xorg-server_1.12.4-1.dsc
 c0e52b1496d427501a2f6b8fea50d040c75bbdb9 7528611 xorg-server_1.12.4.orig.tar.gz
 46c0d2c61213f4cd56e4eae3dcb429f3a9f4aa14 86250 xorg-server_1.12.4-1.diff.gz
 f2f2eff5e872f7b6be858c72a06d8496e1dcbcb6 1395292 xserver-common_1.12.4-1_all.deb
 3a4c72a07276869f5d547ad10465239a3b801f01 1760856 xserver-xorg-core_1.12.4-1_amd64.deb
 a22d9ee71beb9689897e1c97d78c894ec9588f4b 867928 xserver-xorg-core-udeb_1.12.4-1_amd64.udeb
 3caac6d3e390f9626c9857687a7de518993bc79e 319512 xserver-xorg-dev_1.12.4-1_amd64.deb
 dc4af1c43bff38b8535f85123d2bcd369142147f 922338 xdmx_1.12.4-1_amd64.deb
 b68a0221818332801716193b56de3ce5b05ec12e 124862 xdmx-tools_1.12.4-1_amd64.deb
 291dfdaf15cb8a0624715c8070a6821883d9680f 820772 xnest_1.12.4-1_amd64.deb
 bd9605660122361007d01211da9f1be5142585b3 924498 xvfb_1.12.4-1_amd64.deb
 3e9fb925e89b910882c34b09caa8c183a0da3a13 1016988 xserver-xephyr_1.12.4-1_amd64.deb
 6549ab33bc039606b17516caaeeac5317c03c0e0 939124 xserver-xfbdev_1.12.4-1_amd64.deb
 5ffe7db47c7f19d73cd56a8848b0cfa633b0c89e 7290276 xserver-xorg-core-dbg_1.12.4-1_amd64.deb
Checksums-Sha256: 
 366e81898d685ffd1aa411e86b82164a362369242da4f5537bb9a15e0e809b6d 4095 xorg-server_1.12.4-1.dsc
 d88225cd3c4a6ecd92d1360b34a0e5b6346e2a04c842c018cef36d8a370714ef 7528611 xorg-server_1.12.4.orig.tar.gz
 63a0a859f006e21741b1d6b54b75c92db3da79b5352282a3d38e5678c841ca96 86250 xorg-server_1.12.4-1.diff.gz
 d983e82002caa52091e012079e9a0cc28b89949df15b187c3052e35924165bde 1395292 xserver-common_1.12.4-1_all.deb
 3199d0b71a31c4c8956155f203bd35c3c5a439a4c7bf9cf91094190c88dcc962 1760856 xserver-xorg-core_1.12.4-1_amd64.deb
 d433385006cfb0a6fa316d2f262f2ed6f3fab333dddcc21e29e76fb843f11afa 867928 xserver-xorg-core-udeb_1.12.4-1_amd64.udeb
 2e36af32590ed33e3d4283a32b3549498192fcb2809719c6a04274a316864b6b 319512 xserver-xorg-dev_1.12.4-1_amd64.deb
 6035bccb6d18fdb9448b1c698a7606a1e2dfb4782b50c95c97a94859851a3d67 922338 xdmx_1.12.4-1_amd64.deb
 76ccb05b4fadb922dfbdd8e0262cb198797f07bb5498e86949540b767d792f21 124862 xdmx-tools_1.12.4-1_amd64.deb
 fe50bc3da2f7ee0fe7fc86a49223a6f7ff5f88030ae8e215bf2988590dae9e0e 820772 xnest_1.12.4-1_amd64.deb
 371934833835e7b137019a1af34b855f5520706ba8a21ffbd315f7a1986eda76 924498 xvfb_1.12.4-1_amd64.deb
 15cba42a582e6a39ac4c8a41c427f754acc080adf1eba25a160861155c99de74 1016988 xserver-xephyr_1.12.4-1_amd64.deb
 0eb445e10acda9566e9f61d79bf80b2487b9584053f8f486f6c6cd181f9daff8 939124 xserver-xfbdev_1.12.4-1_amd64.deb
 bdf3434bf0799a1f9541f6b1db5ab701cc382f23479e95d9736b97fb2ec3ae5c 7290276 xserver-xorg-core-dbg_1.12.4-1_amd64.deb
Files: 
 7282071cf61c4e8dd052b37f4e13b1c3 4095 x11 optional xorg-server_1.12.4-1.dsc
 19c17bf7ac3e2ce34bc40108692c031f 7528611 x11 optional xorg-server_1.12.4.orig.tar.gz
 864664833a9cbce9d5c85a709b76eadf 86250 x11 optional xorg-server_1.12.4-1.diff.gz
 4e91bc8936fc826e11e61d59ffec92f7 1395292 x11 optional xserver-common_1.12.4-1_all.deb
 752c95c46cfc7e48be5963b53a830fde 1760856 x11 optional xserver-xorg-core_1.12.4-1_amd64.deb
 3808865604af60efb663b4d03ea2e1cb 867928 debian-installer optional xserver-xorg-core-udeb_1.12.4-1_amd64.udeb
 a519a1caac09f8ea44375090e7de274e 319512 x11 optional xserver-xorg-dev_1.12.4-1_amd64.deb
 0415e804f43e6e640fb304bedf176e06 922338 x11 optional xdmx_1.12.4-1_amd64.deb
 200ab28eebc30324e7c594d11753c395 124862 x11 optional xdmx-tools_1.12.4-1_amd64.deb
 600d862f5be724d50cb7798349845ccf 820772 x11 optional xnest_1.12.4-1_amd64.deb
 d22e78e902e3964c202b2e7575748325 924498 x11 optional xvfb_1.12.4-1_amd64.deb
 31181857da8a186b385302ee3fb3d484 1016988 x11 optional xserver-xephyr_1.12.4-1_amd64.deb
 5d94a4ad4f3a2d5f94d04024eb2d21e1 939124 x11 optional xserver-xfbdev_1.12.4-1_amd64.deb
 09889862b8e7d5ec0c2f784d30a5f36e 7290276 debug extra xserver-xorg-core-dbg_1.12.4-1_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=qpZA
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: