Sorry about the big To: and Cc: lines, but since this is the X maintainer's Official Word on the subject, I wanted to make sure it gets disseminated. On Sat, Jul 18, 1998 at 10:55:43PM +0000, Chris Davis wrote: > On 18 Jul 1998, Gregory S. Stark wrote: > > > Brenden seemed to think it was related to PCI detection changes in the > > > 3.3.2.2 XF86 release which sounds right to me. Have you tried 3.3.2.2-2 ? > > > I'm about to try it tonight. Brenden didn't close the bug so I'm not > > > optimistic, but he did say it closed every critical bug so maybe. The severity of that bug was normal. I have no fix for it. I also haven't yet talked about this with the upstream guys, but I will be within in the next couple of days. In the meantime, people who *can* use an alternative X server probably should. I can forsee two outcomes for the hamm release of XFree86: 1) XFree86 gets back to me with a fix, and I'll apply it. 2) I'll "un-patch" the 3.3.2 patch level 2 changes to the SVGA server. None of those patches was security-related in any way, unlike most of the other changes. At first I was just going to leave it in, figuring XFree86 knew what they were doing, and that a small minority of people would be affected. But I keep hearing from people bitten by this thing and it could really hurt Debian 2.0 if it's left in. -- G. Branden Robinson | You live and learn. Purdue University | Or you don't live long. branden@purdue.edu | -- Robert Heinlein http://www.ecn.purdue.edu/~branden/ |
Attachment:
pgpAfDrmWBC1d.pgp
Description: PGP signature