Changeset 1270ee2b


Ignore:
Timestamp:
01/19/2007 04:55:07 AM (15 years ago)
Author:
Dan Nichilson <dnicholson@…>
Branches:
10.0, 10.1, 11.0, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, krejzi/svn, lazarus, nosym, perl-modules, qt5new, systemd-11177, systemd-13485, trunk, xry111/git-date, xry111/git-date-for-trunk, xry111/git-date-test
Children:
8f1faf9f
Parents:
276015d2
Message:

Updated security patches for xorg-6.9.0 and xorg-server-1.1.0

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@6431 af4574ff-66df-0310-9fd7-8a98e5e911e0

Files:
3 edited

Legend:

Unmodified
Added
Removed
  • introduction/welcome/changelog.xml

    r276015d2 r1270ee2b  
    4646      <itemizedlist>
    4747        <listitem>
     48          <para>[dnicholson] - Updated security patches for Xorg-6.9.0
     49          and xorg-server-1.1.0.</para>
     50        </listitem>
     51        <listitem>
    4852          <para>[dnicholson] - Changed the i18n.sh profile text to reference
    4953          the LFS locale discussion and moved the GLib specific settings to
  • x/installing/x7server.xml

    r276015d2 r1270ee2b  
    6262      <listitem>
    6363        <para>Required patch: <ulink
    64         url="&patch-root;/xorg-server-1.1.0-setuid-2.patch"/></para>
     64        url="&patch-root;/xorg-server-1.1.0-security-1.patch"/></para>
    6565      </listitem>
    6666    </itemizedlist>
     
    106106 End remove -->
    107107
    108     <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
    109     vulnerability</ulink> has been identified in the xorg-server
    110     packages. Apply a patch to fix this vulnerability with the following
     108    <para>Multiple <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
     109    vulnerabilities</ulink> have been identified in the xorg-server
     110    package. Apply a patch to fix these vulnerabilities with the following
    111111    command:</para>
    112112
    113 <screen><userinput>patch -Np1 -i ../xorg-server-1.1.0-setuid-2.patch</userinput></screen>
     113<screen><userinput>patch -Np1 -i ../xorg-server-1.1.0-security-1.patch</userinput></screen>
    114114
    115115    <para>Install the server by running the following commands:</para>
  • x/installing/xorg.xml

    r276015d2 r1270ee2b  
    9292      <listitem>
    9393        <para>Required patch: <ulink
    94         url="&patch-root;/xorg-&xorg-version;-security-3.patch"/></para>
     94        url="&patch-root;/xorg-&xorg-version;-security-4.patch"/></para>
    9595      </listitem>
    9696    </itemizedlist>
     
    202202      <para>The <application>Xorg</application> sources must be patched in
    203203      order to avoid a race condition with the <application>luit</application>
    204       program.  Additionally, <application>Xorg</application> contains 4
     204      program.  Additionally, <application>Xorg</application> contains 5
    205205      <ulink url="http://wiki.x.org/wiki/SecurityPage">security
    206206      vulnerabilities</ulink>. Fix these issues with the following
     
    208208
    209209<screen><userinput>patch -Np1 -i ../xorg-&xorg-version;-luit_race-1.patch &amp;&amp;
    210 patch -Np1 -i ../xorg-&xorg-version;-security-3.patch</userinput></screen>
     210patch -Np1 -i ../xorg-&xorg-version;-security-4.patch</userinput></screen>
    211211
    212212      <para>Additionally, if you choose to install
Note: See TracChangeset for help on using the changeset viewer.