Add patchlevel Xorg-7.1+ updates and remove unneeded patches

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@6458 af4574ff-66df-0310-9fd7-8a98e5e911e0
This commit is contained in:
Dan Nichilson 2007-01-23 19:00:33 +00:00
parent 6c787dede0
commit ecef83ed3c
5 changed files with 25 additions and 72 deletions

View File

@ -44,6 +44,11 @@
<listitem>
<para>January 23rd, 2007</para>
<itemizedlist>
<listitem>
<para>[dnicholson] - Patchlevel upgrades to the Xorg-7
packages. Removed unneeded patches encompassed in these
updates. See #2225 for more details.</para>
</listitem>
<listitem>
<para>[dnicholson] - Changed the download location for the
Xorg-7 wget lists and md5sums file.</para>

View File

@ -6,8 +6,8 @@
<!ENTITY luit-download-http "http://xorg.freedesktop.org/releases/individual/app/luit-&luit-version;.tar.bz2">
<!ENTITY luit-download-ftp "ftp://ftp.x.org/pub/individual/app/luit-&luit-version;.tar.bz2">
<!ENTITY luit-md5sum "fbe44e739590d3d73f711bfc8a0e33fd">
<!ENTITY luit-size "92 KB">
<!ENTITY luit-md5sum "aacda46598ce3af8ca16e2a8132db1b2">
<!ENTITY luit-size "97 KB">
<!ENTITY luit-buildsize "1 MB">
<!ENTITY luit-time "0.1 SBU">
@ -71,15 +71,9 @@
<xi:include xmlns:xi="http://www.w3.org/2003/XInclude"
href="../../xincludes/xorg7-only.xml"/>
<para>A patch is required to fix a race condition in
<application>luit</application> that was discovered shortly after
release. Download the patch from
<ulink url="&patch-root;/luit-&luit-version;-race-1.patch"/>.</para>
<para>Install luit with the following commands:</para>
<screen><userinput>patch -Np1 -i ../luit-&luit-version;-race-1.patch &amp;&amp;
./configure $XORG_CONFIG &amp;&amp;
<screen><userinput>./configure $XORG_CONFIG &amp;&amp;
make</userinput></screen>
<para>This package does not come with a test suite.</para>

View File

@ -56,22 +56,10 @@
</listitem>
</itemizedlist>
<!-- Following four patches are security related and should be
<!-- Following patch is security related and should be
fixed for Xorg-7.2 -->
<bridgehead renderas="sect3">Additional Downloads</bridgehead>
<itemizedlist spacing="compact">
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xdm-1.0.4-setuid-1.patch"/></para>
</listitem>
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xf86dga-1.0.1-setuid-1.patch"/></para>
</listitem>
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xinit-1.0.2-setuid-1.patch"/></para>
</listitem>
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xload-1.0.1-setuid-1.patch"/></para>
@ -110,25 +98,10 @@ wget -B http://xorg.freedesktop.org/releases/individual/app/ \
<title>Installation of Xorg Applications</title>
<para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
vulnerability</ulink> has been identified in the xdm, xf86dga, xinit
and xload packages. Before building these packages with the commands
shown below, be sure to apply the supplied patches. For xdm, this can be
accomplished with with the following command:</para>
<screen><userinput>patch -Np1 -i ../xdm-1.0.4-setuid-1.patch</userinput></screen>
<para>For xf86dga, the patch can be applied with the following
command:</para>
<screen><userinput>patch -Np1 -i ../xf86dga-1.0.1-setuid-1.patch</userinput></screen>
<para>For xinit, the patch can be applied with the following
command:</para>
<screen><userinput>patch -Np1 -i ../xinit-1.0.2-setuid-1.patch</userinput></screen>
<para>For xload, the patch can be applied with the following
command:</para>
vulnerability</ulink> has been identified in the xload package.
Before building this package with the commands
shown below, be sure to apply the supplied patches. The patch can be
applied with with the following command:</para>
<screen><userinput>patch -Np1 -i ../xload-1.0.1-setuid-1.patch</userinput></screen>

View File

@ -55,18 +55,10 @@
</listitem>
</itemizedlist>
<!-- Following three patches are security related and should be
<!-- Following patch is security related and has been
fixed for Xorg-7.2 -->
<bridgehead renderas="sect3">Additional Downloads</bridgehead>
<itemizedlist spacing="compact">
<listitem>
<para>Required patch: <ulink
url="&patch-root;/libX11-1.0.1-setuid-1.patch"/></para>
</listitem>
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xtrans-1.0.0-setuid-1.patch"/></para>
</listitem>
<listitem>
<para>Required patch: <ulink
url="&patch-root;/libXfont-1.1.0-cidfonts-1.patch"/></para>
@ -107,21 +99,10 @@ wget -B http://xorg.freedesktop.org/releases/individual/lib/ \
<title>Installation of Xorg Libraries</title>
<para><ulink url='http://wiki.x.org/wiki/SecurityPage'>Security
vulnerabilities</ulink> have been identified in the libX11, xtrans
and libXfont packages. Before building these packages with the
commands shown below, be sure to apply the supplied patches.
For libX11, this can be accomplished with with the following
command:</para>
<screen><userinput>patch -Np1 -i ../libX11-1.0.1-setuid-1.patch</userinput></screen>
<para>For xtrans, the patch can be applied with the following
command:</para>
<screen><userinput>patch -Np1 -i ../xtrans-1.0.0-setuid-1.patch</userinput></screen>
<para>For libXfont, the patch can be applied with the following
command:</para>
vulnerabilities</ulink> have been identified in the libXfont package.
Before building this package with the commands shown below, be sure
to apply the supplied patches. This can be accomplished with with the
following command:</para>
<screen><userinput>patch -Np1 -i ../libXfont-1.1.0-cidfonts-1.patch</userinput></screen>

View File

@ -6,8 +6,8 @@
<!ENTITY xorg-server-download-http "http://xorg.freedesktop.org/releases/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2">
<!ENTITY xorg-server-download-ftp "ftp://ftp.x.org/pub/individual/xserver/xorg-server-&xorg-server-version;.tar.bz2">
<!ENTITY xorg-server-md5sum "d070c58a598fb52c5cb86344725c4ad6">
<!ENTITY xorg-server-size "6.1 MB">
<!ENTITY xorg-server-md5sum "a8ed678677af8ebb2fba5624602f6b2e">
<!ENTITY xorg-server-size "6.0 MB">
<!ENTITY xorg-server-buildsize "424 MB">
<!ENTITY xorg-server-time "5.6 SBU">
@ -61,7 +61,7 @@
<itemizedlist spacing="compact">
<listitem>
<para>Required patch: <ulink
url="&patch-root;/xorg-server-1.1.0-security-1.patch"/></para>
url="&patch-root;/xorg-server-&xorg-server-version;-security-1.patch"/></para>
</listitem>
</itemizedlist>
@ -105,12 +105,12 @@
hw/xfree86/os-support/linux/lnx_agp.c</userinput></screen>
End remove -->
<para>Multiple <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
vulnerabilities</ulink> have been identified in the xorg-server
package. Apply a patch to fix these vulnerabilities with the following
<para>A <ulink url='http://wiki.x.org/wiki/SecurityPage'>security
vulnerability</ulink> have been identified in the xorg-server
package. Apply a patch to fix this vulnerabily with the following
command:</para>
<screen><userinput>patch -Np1 -i ../xorg-server-1.1.0-security-1.patch</userinput></screen>
<screen><userinput>patch -Np1 -i ../xorg-server-&xorg-server-version;-security-1.patch</userinput></screen>
<para>Install the server by running the following commands:</para>