From owner-freebsd-questions Wed Oct 4 14:35:56 2000 Delivered-To: freebsd-questions@freebsd.org Received: from guru.mired.org (okc-27-149-77.mmcable.com [24.27.149.77]) by hub.freebsd.org (Postfix) with SMTP id 37B7C37B502 for ; Wed, 4 Oct 2000 14:35:50 -0700 (PDT) Received: (qmail 286 invoked by uid 100); 3 Oct 2000 23:49:08 -0000 From: Mike Meyer MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <14810.28788.25830.674440@guru.mired.org> Date: Tue, 3 Oct 2000 18:49:08 -0500 (CDT) To: Nader Turki Cc: questions@freebsd.org Subject: Re: XFree 4.x In-Reply-To: <69590909@toto.iv> X-Mailer: VM 6.72 under 21.1 (patch 10) "Capitol Reef" XEmacs Lucid X-face: "5Mnwy%?j>IIV\)A=):rjWL~NB2aH[}Yq8Z=u~vJ`"(,&SiLvbbz2W`;h9L,Yg`+vb1>RG% *h+%X^n0EZd>TM8_IB;a8F?(Fb"lw'IgCoyM.[Lg#r\ Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Nader Turki writes: > I was wondering if the next FreeBSD release will be with XFree86 4.x. You can use XFree86 4.x on the current release; you just have to install it from the port. When you do so, you get a message that starts: XFree86 4.0 may contain vulnerabilities yielding root privileges to local users, due to insecure coding of the setuid root X server. This means it's not a good idea to install it as the default server. Until that gets fixed (and the xfree86 group has to fix it), that won't change.