Changeset b1a4b4a7


Ignore:
Timestamp:
08/12/2020 01:25:28 AM (4 years ago)
Author:
Douglas R. Reno <renodr@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
db480be
Parents:
ccc69593
Message:

Update to libX11-1.6.11
Fix CVE-2020-14347 in xorg-server

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@23492 af4574ff-66df-0310-9fd7-8a98e5e911e0

Files:
3 edited

Legend:

Unmodified
Added
Removed
  • introduction/welcome/changelog.xml

    rccc69593 rb1a4b4a7  
    4545      <para>August 11th, 2020</para>
    4646      <itemizedlist>
     47        <listitem>
     48          <para>[renodr] - Fix CVE-2020-14347 in xorg-server. Fixes
     49          <ulink url="&blfs-ticket-root;13871">#13871</ulink>.</para>
     50        </listitem>
     51        <listitem>
     52          <para>[renodr] - Update to libX11-1.6.11 (Security Fix). Fixes
     53          <ulink url="&blfs-ticket-root;13870">#13870</ulink>.</para>
     54        </listitem>
    4755        <listitem revision="systemd">
    4856          <para>[renodr] - Update to systemd-246. Fixes
  • x/installing/x7lib.xml

    rccc69593 rb1a4b4a7  
    1414  <!ENTITY xtrans-md5sum                   "ce2fb8100c6647ee81451ebe388b17ad">
    1515
    16   <!ENTITY libX11-version                  "1.6.9">
    17   <!ENTITY libX11-md5sum                   "55adbfb6d4370ecac5e70598c4e7eed2">
     16  <!ENTITY libX11-version                  "1.6.11">
     17  <!ENTITY libX11-md5sum                   "35c8e4ef7454163c7d67d1fa6a5e3ed1">
    1818
    1919  <!ENTITY libXext-version                 "1.3.4">
  • x/installing/xorg-server.xml

    rccc69593 rb1a4b4a7  
    132132
    133133<screen><userinput>patch -Np1 -i ../xorg-server-&xorg-server-version;-add_prime_support-1.patch</userinput></screen>-->
     134
     135    <para>
     136      First, apply a fix for a security vulnerability identified upstream:
     137    </para>
     138
     139<screen><userinput remap="pre">sed -i 's/malloc(pScreen/calloc(1, pScreen/' dix/pixmap.c</userinput></screen>
    134140
    135141    <para>
Note: See TracChangeset for help on using the changeset viewer.