Changeset ecef83e for x/installing


Ignore:
Timestamp:
01/23/2007 07:00:33 PM (17 years ago)
Author:
Dan Nichilson <dnicholson@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
199c618
Parents:
6c787ded
Message:

Add patchlevel Xorg-7.1+ updates and remove unneeded patches

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@6458 af4574ff-66df-0310-9fd7-8a98e5e911e0

Location:
x/installing
Files:
4 edited

Legend:

Unmodified
Added
Removed
  • x/installing/luit.xml

    r6c787ded recef83e  
    77  <!ENTITY luit-download-http "http://xorg.freedesktop.org/releases/individual/app/luit-&luit-version;.tar.bz2">
    88  <!ENTITY luit-download-ftp  "ftp://ftp.x.org/pub/individual/app/luit-&luit-version;.tar.bz2">
    9   <!ENTITY luit-md5sum        "fbe44e739590d3d73f711bfc8a0e33fd">
    10   <!ENTITY luit-size          "92 KB">
     9  <!ENTITY luit-md5sum        "aacda46598ce3af8ca16e2a8132db1b2">
     10  <!ENTITY luit-size          "97 KB">
    1111  <!ENTITY luit-buildsize     "1 MB">
    1212  <!ENTITY luit-time          "0.1 SBU">
     
    7272    href="../../xincludes/xorg7-only.xml"/>
    7373
    74     <para>A patch is required to fix a race condition in
    75     <application>luit</application> that was discovered shortly after
    76     release.  Download the patch from
    77     <ulink url="&patch-root;/luit-&luit-version;-race-1.patch"/>.</para>
    78 
    7974    <para>Install luit with the following commands:</para>
    8075
    81 <screen><userinput>patch -Np1 -i ../luit-&luit-version;-race-1.patch &amp;&amp;
    82 ./configure $XORG_CONFIG &amp;&amp;
     76<screen><userinput>./configure $XORG_CONFIG &amp;&amp;
    8377make</userinput></screen>
    8478
  • x/installing/x7app.xml

    r6c787ded recef83e  
    5757    </itemizedlist>
    5858
    59     <!-- Following four patches are security related and should be
     59    <!-- Following patch is security related and should be
    6060        fixed for Xorg-7.2 -->
    6161    <bridgehead renderas="sect3">Additional Downloads</bridgehead>
    6262    <itemizedlist spacing="compact">
    63       <listitem>
    64         <para>Required patch: <ulink
    65         url="&patch-root;/xdm-1.0.4-setuid-1.patch"/></para>
    66       </listitem>
    67       <listitem>
    68         <para>Required patch: <ulink
    69         url="&patch-root;/xf86dga-1.0.1-setuid-1.patch"/></para>
    70       </listitem>
    71       <listitem>
    72         <para>Required patch: <ulink
    73         url="&patch-root;/xinit-1.0.2-setuid-1.patch"/></para>
    74       </listitem>
    7563      <listitem>
    7664        <para>Required patch: <ulink
     
    11199
    112100    <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
    113     vulnerability</ulink> has been identified in the xdm, xf86dga, xinit
    114     and xload packages. Before building these packages with the commands
    115     shown below, be sure to apply the supplied patches. For xdm, this can be
    116     accomplished with with the following command:</para>
    117 
    118 <screen><userinput>patch -Np1 -i ../xdm-1.0.4-setuid-1.patch</userinput></screen>
    119 
    120     <para>For xf86dga, the patch can be applied with the following
    121     command:</para>
    122 
    123 <screen><userinput>patch -Np1 -i ../xf86dga-1.0.1-setuid-1.patch</userinput></screen>
    124 
    125     <para>For xinit, the patch can be applied with the following
    126     command:</para>
    127 
    128 <screen><userinput>patch -Np1 -i ../xinit-1.0.2-setuid-1.patch</userinput></screen>
    129 
    130     <para>For xload, the patch can be applied with the following
    131     command:</para>
     101    vulnerability</ulink> has been identified in the xload package.
     102    Before building this package with the commands
     103    shown below, be sure to apply the supplied patches. The patch can be
     104    applied with with the following command:</para>
    132105
    133106<screen><userinput>patch -Np1 -i ../xload-1.0.1-setuid-1.patch</userinput></screen>
  • x/installing/x7lib.xml

    r6c787ded recef83e  
    5656    </itemizedlist>
    5757
    58     <!-- Following three patches are security related and should be
     58    <!-- Following patch is security related and has been
    5959        fixed for Xorg-7.2 -->
    6060    <bridgehead renderas="sect3">Additional Downloads</bridgehead>
    6161    <itemizedlist spacing="compact">
    62       <listitem>
    63         <para>Required patch: <ulink
    64         url="&patch-root;/libX11-1.0.1-setuid-1.patch"/></para>
    65       </listitem>
    66       <listitem>
    67         <para>Required patch: <ulink
    68         url="&patch-root;/xtrans-1.0.0-setuid-1.patch"/></para>
    69       </listitem>
    7062      <listitem>
    7163        <para>Required patch: <ulink
     
    108100
    109101    <para><ulink url='http://wiki.x.org/wiki/SecurityPage'>Security
    110     vulnerabilities</ulink> have been identified in the libX11, xtrans
    111     and libXfont packages. Before building these packages with the
    112     commands shown below, be sure to apply the supplied patches.
    113     For libX11, this can be accomplished with with the following
    114     command:</para>
    115 
    116 <screen><userinput>patch -Np1 -i ../libX11-1.0.1-setuid-1.patch</userinput></screen>
    117 
    118     <para>For xtrans, the patch can be applied with the following
    119     command:</para>
    120 
    121 <screen><userinput>patch -Np1 -i ../xtrans-1.0.0-setuid-1.patch</userinput></screen>
    122 
    123     <para>For libXfont, the patch can be applied with the following
    124     command:</para>
     102    vulnerabilities</ulink> have been identified in the libXfont package.
     103    Before building this package with the commands shown below, be sure
     104    to apply the supplied patches. This can be accomplished with with the
     105    following command:</para>
    125106
    126107<screen><userinput>patch -Np1 -i ../libXfont-1.1.0-cidfonts-1.patch</userinput></screen>
  • x/installing/x7server.xml

    r6c787ded recef83e  
    77  <!ENTITY xorg-server-download-http "http://xorg.freedesktop.org/releases/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2">
    88  <!ENTITY xorg-server-download-ftp  "ftp://ftp.x.org/pub/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2">
    9   <!ENTITY xorg-server-md5sum        "d070c58a598fb52c5cb86344725c4ad6">
    10   <!ENTITY xorg-server-size          "6.1 MB">
     9  <!ENTITY xorg-server-md5sum        "a8ed678677af8ebb2fba5624602f6b2e">
     10  <!ENTITY xorg-server-size          "6.0 MB">
    1111  <!ENTITY xorg-server-buildsize     "424 MB">
    1212  <!ENTITY xorg-server-time          "5.6 SBU">
     
    6262      <listitem>
    6363        <para>Required patch: <ulink
    64         url="&patch-root;/xorg-server-1.1.0-security-1.patch"/></para>
     64        url="&patch-root;/xorg-server-&xorg-server-version;-security-1.patch"/></para>
    6565      </listitem>
    6666    </itemizedlist>
     
    106106 End remove -->
    107107
    108     <para>Multiple <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
    109     vulnerabilities</ulink> have been identified in the xorg-server
    110     package. Apply a patch to fix these vulnerabilities with the following
     108    <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
     109    vulnerability</ulink> have been identified in the xorg-server
     110    package. Apply a patch to fix this vulnerabily with the following
    111111    command:</para>
    112112
    113 <screen><userinput>patch -Np1 -i ../xorg-server-1.1.0-security-1.patch</userinput></screen>
     113<screen><userinput>patch -Np1 -i ../xorg-server-&xorg-server-version;-security-1.patch</userinput></screen>
    114114
    115115    <para>Install the server by running the following commands:</para>
Note: See TracChangeset for help on using the changeset viewer.