- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2011:1451 - openmotif bug fix update
Synopsis
openmotif bug fix update
Type/Severity
Bug Fix Advisory (none)
Topic
An updated openmotif package that fixes various bugs is now available for Red Hat Enterprise Linux 5.
Description
The openmotif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager.
This updated openmotif package includes fixes for the following bugs:
-
Prior to this update, the size set in the GeometryManager() function based on the XmFormConstraint "preferred_width" field was not updated when the label was changed and still contained the previous label length. Consequently, if the label text was modified while the window was smaller than the actual label width, the resulting size was incorrectly computed and the label text truncated. With this update the values are updated and the fault no longer occurs in the scenario described. (BZ#583977)
-
Red Hat Enterprise Linux 6.0 was released with Open Motif 2.3.0, which introduced a bug in the LabelGadget widget. Consequently, under certain circumstances, LabelGadget could have drawn over a parent window with the background color and, if using the Xft fonts, also over the text. With this update, the text and background drawing the code has been corrected and the problem no longer occurs. (BZ#584287)
-
Prior to this update, the XmeTraitSet() function in ToolTips added Traits but they were never removed, even when the objects were destroyed, which resulted in memory leaks. With this update, the incorrect code has been fixed and memory leaks no longer occur in the scenario described. (BZ#644824)
-
Prior to this update, the foreground and background color for insensitive labels (labels on items which are not currently sensitive or clickable) could sometimes be identical when using Xft fonts. As a consequence, text in insensitive labels using Xft fonts were invisible. With this update, the code has been corrected and the problem no longer occurs. (BZ#684210)
-
Double free errors occur when free() is called more than once with the same memory address as an argument. Prior to this update, the helper widget "im_widget" could be closed twice, leading to a double free error, when the parent widget was closed. With this update, the code has been corrected and the problem no longer occurs. (BZ#695650)
All users of openmotif are advised to upgrade to this updated package, which fixes these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- openmotif-devel-2.3.1-6.el5.x86_64.rpm
- openmotif-devel-2.3.1-6.el5.ia64.rpm
- openmotif-2.3.1-6.el5.ppc.rpm
- openmotif-devel-2.3.1-6.el5.s390.rpm
- openmotif-devel-2.3.1-6.el5.s390x.rpm
- openmotif-2.3.1-6.el5.ppc64.rpm
- openmotif-2.3.1-6.el5.ia64.rpm
- openmotif-devel-2.3.1-6.el5.ppc64.rpm
- openmotif-2.3.1-6.el5.i386.rpm
- openmotif-devel-2.3.1-6.el5.ppc.rpm
- openmotif-2.3.1-6.el5.s390.rpm
- openmotif-2.3.1-6.el5.s390x.rpm
- openmotif-devel-2.3.1-6.el5.i386.rpm
- openmotif-2.3.1-6.el5.x86_64.rpm
- openmotif-2.3.1-6.el5.src.rpm
Fixes
- This content is not included.BZ - 583977
- This content is not included.BZ - 584287
- This content is not included.BZ - 644824
- This content is not included.BZ - 684210
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.