Changeset ecef83e for x/installing/x7server.xml
- Timestamp:
- 01/23/2007 07:00:33 PM (17 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 199c618
- Parents:
- 6c787ded
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
x/installing/x7server.xml
r6c787ded recef83e 7 7 <!ENTITY xorg-server-download-http "http://xorg.freedesktop.org/releases/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2"> 8 8 <!ENTITY xorg-server-download-ftp "ftp://ftp.x.org/pub/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2"> 9 <!ENTITY xorg-server-md5sum " d070c58a598fb52c5cb86344725c4ad6">10 <!ENTITY xorg-server-size "6. 1MB">9 <!ENTITY xorg-server-md5sum "a8ed678677af8ebb2fba5624602f6b2e"> 10 <!ENTITY xorg-server-size "6.0 MB"> 11 11 <!ENTITY xorg-server-buildsize "424 MB"> 12 12 <!ENTITY xorg-server-time "5.6 SBU"> … … 62 62 <listitem> 63 63 <para>Required patch: <ulink 64 url="&patch-root;/xorg-server- 1.1.0-security-1.patch"/></para>64 url="&patch-root;/xorg-server-&xorg-server-version;-security-1.patch"/></para> 65 65 </listitem> 66 66 </itemizedlist> … … 106 106 End remove --> 107 107 108 <para> Multiple<ulink url='http://wiki.x.org/wiki/SecurityPage'>security109 vulnerabilit ies</ulink> have been identified in the xorg-server110 package. Apply a patch to fix th ese vulnerabilitieswith the following108 <para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security 109 vulnerability</ulink> have been identified in the xorg-server 110 package. Apply a patch to fix this vulnerabily with the following 111 111 command:</para> 112 112 113 <screen><userinput>patch -Np1 -i ../xorg-server- 1.1.0-security-1.patch</userinput></screen>113 <screen><userinput>patch -Np1 -i ../xorg-server-&xorg-server-version;-security-1.patch</userinput></screen> 114 114 115 115 <para>Install the server by running the following commands:</para>
Note:
See TracChangeset
for help on using the changeset viewer.