[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#702662: marked as done (xserver-xorg-core: multitouch stuck button, apply upstream patch)



Your message dated Wed, 17 Apr 2013 11:03:18 +0000
with message-id <E1USQ90-0006Lf-MA@franck.debian.org>
and subject line Bug#702662: fixed in xorg-server 2:1.12.4-6
has caused the Debian Bug report #702662,
regarding xserver-xorg-core: multitouch stuck button, apply upstream patch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
702662: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702662
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: xserver-xorg-core
Version: 2:1.12.4-5
Severity: important

Dear Maintainer,

Please apply the following two multitouch bug fixes to
xserver-xorg-core for Wheezy.  Currently an event from a multitouch
device will be translated into a pointer event including simulating
pressing the first mouse button, the problem is the button down state
is never released, meaning from then on all mouse events will have a
state of button one held, causing programs to misbehave in important
ways.  This persists until X is restarted, even unplugging the
touchscreen device doesn't clear it.

3e6358ee6c33979329b78fe2097a1fdf76fb69cd
'Xi: Don't check for TOUCH_END, it's never set'

863f32c930d71073ee5f78452b78bd459d024867
'Xi: Update the device after delivering the emulated pointer event(#56558)'

Interestingly enough when the synaptics driver gets an input from a
touch pad it will reset the held button state, otherwise the only
option is to restart X and not touch the touch pad.

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8.0+ (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/dash

Versions of packages xserver-xorg-core depends on:
ii  keyboard-configuration  1.88
ii  libaudit0               1:1.7.18-1.1
ii  libc6                   2.13-38
ii  libdrm2                 2.4.40-1~deb7u2
ii  libgcrypt11             1.5.0-3
ii  libpciaccess0           0.13.1-2
ii  libpixman-1-0           0.26.0-4
ii  libselinux1             2.1.9-5
ii  libudev0                175-7.1
ii  libxau6                 1:1.0.7-1
ii  libxdmcp6               1:1.1.1-1
ii  libxfont1               1:1.4.5-2
ii  udev                    175-7.1
ii  xserver-common          2:1.12.4-5

Versions of packages xserver-xorg-core recommends:
ii  libgl1-mesa-dri  8.0.5-3

Versions of packages xserver-xorg-core suggests:
ii  xfonts-100dpi    1:1.0.3
ii  xfonts-75dpi     1:1.0.3
ii  xfonts-scalable  1:1.0.3-1

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: xorg-server
Source-Version: 2:1.12.4-6

We believe that the bug you reported is fixed in the latest version of
xorg-server, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 702662@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <jcristau@debian.org> (supplier of updated xorg-server package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 17 Apr 2013 12:12:30 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx xdmx-tools xnest xvfb xserver-xephyr xserver-xfbdev xserver-xorg-core-dbg xserver-common
Architecture: source all amd64
Version: 2:1.12.4-6
Distribution: unstable
Urgency: low
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Description: 
 xdmx       - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest      - Nested X server
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xfbdev - Linux framebuffer device tiny X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-dbg - Xorg - the X.Org X server (debugging symbols)
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xvfb       - Virtual Framebuffer 'fake' X server
Closes: 696272 702662
Changes: 
 xorg-server (2:1.12.4-6) unstable; urgency=low
 .
   * Touch: Fix duplicate TouchBegin selection with virtual devices
     (closes: #696272)
   * Xi: Don't check for TOUCH_END, it's never set
   * Xi: Update the device after delivering the emulated pointer event
     (closes: #702662)
   * xf86: fix flush input to work with Linux evdev devices.  Addresses
     CVE-2013-1940.
Checksums-Sha1: 
 6f3ab5132250578e725b839b03d80e11dfa9f15d 4122 xorg-server_1.12.4-6.dsc
 d7c9393952c5a0263efa9d3e05c847644be96bb8 91064 xorg-server_1.12.4-6.diff.gz
 f0c9a201249aa0f6e8dccb3d868d89f2c2b2480a 1396058 xserver-common_1.12.4-6_all.deb
 841e984ccba164d445c3545e7c00f8affe0ac5bd 1761888 xserver-xorg-core_1.12.4-6_amd64.deb
 55cc0c1204f021ea35a8bebb360a6bf1f7936ac7 867274 xserver-xorg-core-udeb_1.12.4-6_amd64.udeb
 66b1c6d99d631ce6fa97ba593684c8c142a120a4 320068 xserver-xorg-dev_1.12.4-6_amd64.deb
 95232d063e5e2000c074a1293c7b00598d0e902c 922904 xdmx_1.12.4-6_amd64.deb
 9b544f39154f5f3a21acee2b7cf8b48a89b646af 125488 xdmx-tools_1.12.4-6_amd64.deb
 315be6d40ab917d5c476d3e5679ed28d4d21c265 821518 xnest_1.12.4-6_amd64.deb
 2de3807c8fd3178c25c260ff599f0879f418fde4 925104 xvfb_1.12.4-6_amd64.deb
 0137d0d33d6225c5eb4157e40e1ac50532923901 1017864 xserver-xephyr_1.12.4-6_amd64.deb
 f0319647359437a8de5b10eb0de564230f3771ed 939940 xserver-xfbdev_1.12.4-6_amd64.deb
 91a3edc4acf6960b9329d25a4157142312b99a8d 7290152 xserver-xorg-core-dbg_1.12.4-6_amd64.deb
Checksums-Sha256: 
 bc4b1357cdf966705b04dcb5d2ee054871be5380c2ecb33a5dc8fc95746d3fc6 4122 xorg-server_1.12.4-6.dsc
 ffc84bced8a6f4f0cf9f13537491f2ae83b846ae090810a900f8aca80610fa73 91064 xorg-server_1.12.4-6.diff.gz
 b8486b67c6d3fbeac3e983571af053c2e17f750ef1a5737e74bd5011cd4f5a88 1396058 xserver-common_1.12.4-6_all.deb
 3979dfeb83ae336a7ef034e87a10b06c518109abdc010ad978e6a7525a1e0f7c 1761888 xserver-xorg-core_1.12.4-6_amd64.deb
 67a9e7d578ed5e049d3c3e067d6a93fc4d01dd7e2add22935e1c503f5af8e8ef 867274 xserver-xorg-core-udeb_1.12.4-6_amd64.udeb
 cc8d924225884e2b00177c6b963e3e04737d084e6439429fe706c6100f1edae9 320068 xserver-xorg-dev_1.12.4-6_amd64.deb
 374c306b9d2e82740e32f4eec078c7c6850feddf0eb78b96d862331ecc578808 922904 xdmx_1.12.4-6_amd64.deb
 81d21d429c4d8a994a5e90eb96ff0ba0ddff1170adbd3ab8682142459bba58fb 125488 xdmx-tools_1.12.4-6_amd64.deb
 74cd03c281e5d1e262fc700d51179afe312370028984619944497a6228fc9111 821518 xnest_1.12.4-6_amd64.deb
 66480b3e8e239f8e126c7f7e25b70b024a34b338a0e86a19c4fa1ccc7e15b4ec 925104 xvfb_1.12.4-6_amd64.deb
 92427a0f09400ee6782db5668a6e0616700aecb4c228b3ca1c46937f90e4d4c9 1017864 xserver-xephyr_1.12.4-6_amd64.deb
 0bd14dd001ed0a86925b013ceabb491d7809e32ddc375caca585e7a2b8e893e0 939940 xserver-xfbdev_1.12.4-6_amd64.deb
 db7ec4442e09b45b036d652845734f48ed9c553c0ba85c91642486c2957110c1 7290152 xserver-xorg-core-dbg_1.12.4-6_amd64.deb
Files: 
 e92a4a0aecda3ff6193b3b4a7761c835 4122 x11 optional xorg-server_1.12.4-6.dsc
 2df0fcccb28d7706f0581c753df88e9e 91064 x11 optional xorg-server_1.12.4-6.diff.gz
 810b66c2644b9ae3d53fb15414470025 1396058 x11 optional xserver-common_1.12.4-6_all.deb
 eeff6931361fd0ca4b74dd4fe9dceb47 1761888 x11 optional xserver-xorg-core_1.12.4-6_amd64.deb
 73ee6c5b439f327d1f2e14a808132844 867274 debian-installer optional xserver-xorg-core-udeb_1.12.4-6_amd64.udeb
 46f2769ff4b771b0f4095489ebd9c039 320068 x11 optional xserver-xorg-dev_1.12.4-6_amd64.deb
 7dc1a694a3d678ac3f4d5d1b31e68904 922904 x11 optional xdmx_1.12.4-6_amd64.deb
 b9862a2ee13fa2438b84bea6d4c028c0 125488 x11 optional xdmx-tools_1.12.4-6_amd64.deb
 e352047b7eaa95aa74634469a34776fb 821518 x11 optional xnest_1.12.4-6_amd64.deb
 4325052516ad1f4ab6ccc1ffae96b5ed 925104 x11 optional xvfb_1.12.4-6_amd64.deb
 efc61387f9ac4fea0a2934e6938b8a06 1017864 x11 optional xserver-xephyr_1.12.4-6_amd64.deb
 75974c391c8d75aff4a280387e9193d0 939940 x11 optional xserver-xfbdev_1.12.4-6_amd64.deb
 f3e183131f6fa86e3b2650573687c2d8 7290152 debug extra xserver-xorg-core-dbg_1.12.4-6_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=aCSB
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: