Ignore:
Timestamp:
01/23/2007 07:00:33 PM (17 years ago)
Author:
Dan Nichilson <dnicholson@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
199c618
Parents:
6c787ded
Message:

Add patchlevel Xorg-7.1+ updates and remove unneeded patches

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@6458 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • x/installing/x7app.xml

    r6c787ded recef83e  
    5757    </itemizedlist>
    5858
    59     <!-- Following four patches are security related and should be
     59    <!-- Following patch is security related and should be
    6060        fixed for Xorg-7.2 -->
    6161    <bridgehead renderas="sect3">Additional Downloads</bridgehead>
    6262    <itemizedlist spacing="compact">
    63       <listitem>
    64         <para>Required patch: <ulink
    65         url="&patch-root;/xdm-1.0.4-setuid-1.patch"/></para>
    66       </listitem>
    67       <listitem>
    68         <para>Required patch: <ulink
    69         url="&patch-root;/xf86dga-1.0.1-setuid-1.patch"/></para>
    70       </listitem>
    71       <listitem>
    72         <para>Required patch: <ulink
    73         url="&patch-root;/xinit-1.0.2-setuid-1.patch"/></para>
    74       </listitem>
    7563      <listitem>
    7664        <para>Required patch: <ulink
     
    11199
    112100    <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
    113     vulnerability</ulink> has been identified in the xdm, xf86dga, xinit
    114     and xload packages. Before building these packages with the commands
    115     shown below, be sure to apply the supplied patches. For xdm, this can be
    116     accomplished with with the following command:</para>
    117 
    118 <screen><userinput>patch -Np1 -i ../xdm-1.0.4-setuid-1.patch</userinput></screen>
    119 
    120     <para>For xf86dga, the patch can be applied with the following
    121     command:</para>
    122 
    123 <screen><userinput>patch -Np1 -i ../xf86dga-1.0.1-setuid-1.patch</userinput></screen>
    124 
    125     <para>For xinit, the patch can be applied with the following
    126     command:</para>
    127 
    128 <screen><userinput>patch -Np1 -i ../xinit-1.0.2-setuid-1.patch</userinput></screen>
    129 
    130     <para>For xload, the patch can be applied with the following
    131     command:</para>
     101    vulnerability</ulink> has been identified in the xload package.
     102    Before building this package with the commands
     103    shown below, be sure to apply the supplied patches. The patch can be
     104    applied with with the following command:</para>
    132105
    133106<screen><userinput>patch -Np1 -i ../xload-1.0.1-setuid-1.patch</userinput></screen>
Note: See TracChangeset for help on using the changeset viewer.