Changeset ecef83e for x/installing/x7app.xml
- Timestamp:
- 01/23/2007 07:00:33 PM (17 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 199c618
- Parents:
- 6c787ded
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
x/installing/x7app.xml
r6c787ded recef83e 57 57 </itemizedlist> 58 58 59 <!-- Following four patches aresecurity related and should be59 <!-- Following patch is security related and should be 60 60 fixed for Xorg-7.2 --> 61 61 <bridgehead renderas="sect3">Additional Downloads</bridgehead> 62 62 <itemizedlist spacing="compact"> 63 <listitem>64 <para>Required patch: <ulink65 url="&patch-root;/xdm-1.0.4-setuid-1.patch"/></para>66 </listitem>67 <listitem>68 <para>Required patch: <ulink69 url="&patch-root;/xf86dga-1.0.1-setuid-1.patch"/></para>70 </listitem>71 <listitem>72 <para>Required patch: <ulink73 url="&patch-root;/xinit-1.0.2-setuid-1.patch"/></para>74 </listitem>75 63 <listitem> 76 64 <para>Required patch: <ulink … … 111 99 112 100 <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security 113 vulnerability</ulink> has been identified in the xdm, xf86dga, xinit 114 and xload packages. Before building these packages with the commands 115 shown below, be sure to apply the supplied patches. For xdm, this can be 116 accomplished with with the following command:</para> 117 118 <screen><userinput>patch -Np1 -i ../xdm-1.0.4-setuid-1.patch</userinput></screen> 119 120 <para>For xf86dga, the patch can be applied with the following 121 command:</para> 122 123 <screen><userinput>patch -Np1 -i ../xf86dga-1.0.1-setuid-1.patch</userinput></screen> 124 125 <para>For xinit, the patch can be applied with the following 126 command:</para> 127 128 <screen><userinput>patch -Np1 -i ../xinit-1.0.2-setuid-1.patch</userinput></screen> 129 130 <para>For xload, the patch can be applied with the following 131 command:</para> 101 vulnerability</ulink> has been identified in the xload package. 102 Before building this package with the commands 103 shown below, be sure to apply the supplied patches. The patch can be 104 applied with with the following command:</para> 132 105 133 106 <screen><userinput>patch -Np1 -i ../xload-1.0.1-setuid-1.patch</userinput></screen>
Note:
See TracChangeset
for help on using the changeset viewer.