Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /slackware/slackware64/extra/source/tigervnc/patches/xorg-server/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
fix-nouveau-segfault.diff.gz298 B2018-05-30 05:02:41
x11.startwithblackscreen.diff.gz340 B2012-04-14 03:01:32
CVE-2022-46340.correction.patch.gz345 B2022-12-19 18:38:10
fix-pci-segfault.diff.gz357 B2020-09-11 18:38:30
06_use-intel-only-on-pre-gen4.diff.gz418 B2020-12-02 09:50:36
CVE-2023-0494.patch.gz605 B2023-02-07 19:33:33
0001-Always-install-vbe-and-int10-sdk-headers.patch.gz623 B2018-07-15 18:32:31
CVE-2022-3550.patch.gz637 B2022-10-17 18:19:57
CVE-2022-4283.patch.gz664 B2022-12-14 19:20:46
857.patch.gz694 B2023-02-07 19:35:51
CVE-2024-31081.patch.gz751 B2024-04-03 21:43:49
CVE-2024-0229.03.patch.gz781 B2024-01-16 19:44:32
CVE-2023-1393.patch.gz792 B2023-03-29 18:09:25
CVE-2024-31080.patch.gz801 B2024-04-03 21:41:48
CVE-2024-31082.patch.gz803 B2024-04-03 21:43:20
CVE-2022-3551.patch.gz842 B2022-10-17 18:21:12
CVE-2024-21886.02.patch.gz859 B2024-01-16 19:46:00
CVE-2022-46343.patch.gz863 B2022-12-14 19:22:50
0001-xfree86-use-modesetting-driver-by-default-on-GeForce.patch.gz879 B2019-02-26 23:17:17
xorg-server.combo.mouse.keyboard.layout.patch.gz897 B2016-04-14 16:42:43
CVE-2022-3553.patch.gz907 B2022-10-17 18:21:57
CVE-2023-6478.patch.gz972 B2023-12-13 20:03:59
CVE-2024-0409.patch.gz981 B2024-01-16 19:46:42
CVE-2023-6816.patch.gz998 B2024-01-16 19:41:49
CVE-2024-9632.patch.gz1022 B2024-10-30 16:44:18
CVE-2022-46344.patch.gz1.0 KiB2022-12-14 19:23:32
CVE-2022-46340.patch.gz1.0 KiB2022-12-14 19:21:24
CVE-2024-21886.01.patch.gz1.1 KiB2024-01-16 19:45:41
CVE-2023-5367.patch.gz1.1 KiB2023-10-25 18:35:41
CVE-2023-6377.patch.gz1.1 KiB2023-12-13 20:03:04
CVE-2024-0408.patch.gz1.1 KiB2024-01-16 19:47:05
0001-f1070c01d616c5f21f939d5ebc533738779451ac.patch.gz1.1 KiB2022-07-12 17:02:20
CVE-2024-21885.patch.gz1.3 KiB2024-01-16 19:45:17
CVE-2022-46341.patch.gz1.3 KiB2022-12-14 19:21:54
CVE-2024-0229.01.patch.gz1.4 KiB2024-01-16 19:44:03
CVE-2022-46342.patch.gz1.4 KiB2022-12-14 19:22:23
CVE-2023-5380.patch.gz1.5 KiB2023-10-25 18:40:14
CVE-2024-31083.patch.gz1.6 KiB2024-04-03 22:11:37
0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch.gz1.9 KiB2022-07-12 17:03:34
0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch.gz2.2 KiB2022-07-12 17:03:06
CVE-2024-0229.02.patch.gz2.2 KiB2024-01-16 19:44:20
0001-autobind-GPUs-to-the-screen.patch.gz3.8 KiB2018-07-15 18:32:31