Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /slackware/slackware64/extra/source/tigervnc/patches/xorg-server/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
x11.startwithblackscreen.diff.gz340 B2012-04-14 03:01:32
xorg-server.combo.mouse.keyboard.layout.patch.gz897 B2016-04-14 16:42:43
fix-nouveau-segfault.diff.gz298 B2018-05-30 05:02:41
0001-autobind-GPUs-to-the-screen.patch.gz3.8 KiB2018-07-15 18:32:31
0001-Always-install-vbe-and-int10-sdk-headers.patch.gz623 B2018-07-15 18:32:31
0001-xfree86-use-modesetting-driver-by-default-on-GeForce.patch.gz879 B2019-02-26 23:17:17
fix-pci-segfault.diff.gz357 B2020-09-11 18:38:30
06_use-intel-only-on-pre-gen4.diff.gz418 B2020-12-02 09:50:36
0001-f1070c01d616c5f21f939d5ebc533738779451ac.patch.gz1.1 KiB2022-07-12 17:02:20
0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch.gz2.2 KiB2022-07-12 17:03:06
0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch.gz1.9 KiB2022-07-12 17:03:34
CVE-2022-3550.patch.gz637 B2022-10-17 18:19:57
CVE-2022-3551.patch.gz842 B2022-10-17 18:21:12
CVE-2022-3553.patch.gz907 B2022-10-17 18:21:57
CVE-2022-4283.patch.gz664 B2022-12-14 19:20:46
CVE-2022-46340.patch.gz1.0 KiB2022-12-14 19:21:24
CVE-2022-46341.patch.gz1.3 KiB2022-12-14 19:21:54
CVE-2022-46342.patch.gz1.4 KiB2022-12-14 19:22:23
CVE-2022-46343.patch.gz863 B2022-12-14 19:22:50
CVE-2022-46344.patch.gz1.0 KiB2022-12-14 19:23:32
CVE-2022-46340.correction.patch.gz345 B2022-12-19 18:38:10
CVE-2023-0494.patch.gz605 B2023-02-07 19:33:33
857.patch.gz694 B2023-02-07 19:35:51
CVE-2023-1393.patch.gz792 B2023-03-29 18:09:25
CVE-2023-5367.patch.gz1.1 KiB2023-10-25 18:35:41
CVE-2023-5380.patch.gz1.5 KiB2023-10-25 18:40:14
CVE-2023-6377.patch.gz1.1 KiB2023-12-13 20:03:04
CVE-2023-6478.patch.gz972 B2023-12-13 20:03:59
CVE-2023-6816.patch.gz998 B2024-01-16 19:41:49
CVE-2024-0229.01.patch.gz1.4 KiB2024-01-16 19:44:03
CVE-2024-0229.02.patch.gz2.2 KiB2024-01-16 19:44:20
CVE-2024-0229.03.patch.gz781 B2024-01-16 19:44:32
CVE-2024-21885.patch.gz1.3 KiB2024-01-16 19:45:17
CVE-2024-21886.01.patch.gz1.1 KiB2024-01-16 19:45:41
CVE-2024-21886.02.patch.gz859 B2024-01-16 19:46:00
CVE-2024-0409.patch.gz981 B2024-01-16 19:46:42
CVE-2024-0408.patch.gz1.1 KiB2024-01-16 19:47:05
CVE-2024-31080.patch.gz801 B2024-04-03 21:41:48
CVE-2024-31082.patch.gz803 B2024-04-03 21:43:20
CVE-2024-31081.patch.gz751 B2024-04-03 21:43:49
CVE-2024-31083.patch.gz1.6 KiB2024-04-03 22:11:37
CVE-2024-9632.patch.gz1022 B2024-10-30 16:44:18