slackware-current/source/x/x11/patch
Patrick J Volkerding 44f92d940d Thu Nov 22 05:56:56 UTC 2018
a/kernel-generic-4.19.3-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.19.3-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.19.3-x86_64-1.txz:  Upgraded.
a/openssl-solibs-1.1.1a-x86_64-1.txz:  Upgraded.
a/sysvinit-scripts-2.1-noarch-21.txz:  Rebuilt.
  rc.S: Don't run rc.fuse - udev takes care of the FUSE module and filesystem.
  rc.S: Support replacing the /etc/mtab file with a symlink to /proc/mounts.
  rc.6: Show more information when unmounting filesystems at shutdown.
ap/ghostscript-9.26-x86_64-1.txz:  Upgraded.
ap/mariadb-10.3.11-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    https://mariadb.com/kb/en/library/mariadb-10311-release-notes/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3282
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-9843
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3174
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3143
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3156
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3251
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3185
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3277
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3162
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3173
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3200
    https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3284
  (* Security fix *)
d/cmake-3.13.0-x86_64-1.txz:  Upgraded.
d/git-2.19.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.14.63-x86-1.txz:  Upgraded.
d/kernel-headers-4.19.3-x86-1.txz:  Upgraded.
d/vala-0.42.3-x86_64-1.txz:  Added.
k/kernel-source-4.19.3-noarch-1.txz:  Upgraded.
l/adwaita-icon-theme-3.30.0-noarch-1.txz:  Upgraded.
l/at-spi2-atk-2.30.0-x86_64-1.txz:  Upgraded.
l/at-spi2-core-2.30.0-x86_64-1.txz:  Upgraded.
l/atk-2.30.0-x86_64-1.txz:  Upgraded.
l/atkmm-2.28.0-x86_64-1.txz:  Upgraded.
l/dconf-0.28.0-x86_64-1.txz:  Upgraded.
  dconf and dconf-editor require Vala; the alternative would be to try to
  stick with the old versions forever, and we don't want to do that.
l/dconf-editor-3.30.2-x86_64-1.txz:  Upgraded.
l/gcr-3.28.0-x86_64-3.txz:  Rebuilt.
  Recompiled to add Vala bindings.
l/gdk-pixbuf2-2.38.0-x86_64-1.txz:  Upgraded.
l/gexiv2-0.10.9-x86_64-1.txz:  Upgraded.
l/glib-networking-2.58.0-x86_64-1.txz:  Upgraded.
l/glib2-2.58.1-x86_64-1.txz:  Upgraded.
l/glibmm-2.58.0-x86_64-1.txz:  Upgraded.
l/gobject-introspection-1.58.0-x86_64-1.txz:  Upgraded.
l/gtk+3-3.24.1-x86_64-1.txz:  Upgraded.
l/gtkmm3-3.24.0-x86_64-1.txz:  Upgraded.
l/gvfs-1.38.1-x86_64-1.txz:  Upgraded.
l/libcap-2.26-x86_64-1.txz:  Upgraded.
l/libpsl-0.20.1-x86_64-1.txz:  Added.
  Required by libsoup.
l/libsoup-2.64.2-x86_64-1.txz:  Upgraded.
l/pangomm-2.42.0-x86_64-1.txz:  Upgraded.
l/pygobject3-3.30.2-x86_64-1.txz:  Upgraded.
l/vte-0.54.2-x86_64-1.txz:  Upgraded.
n/openssl-1.1.1a-x86_64-1.txz:  Upgraded.
  This update fixes timing side channel attacks on DSA and ECDSA signature
  generation that could allow an attacker to recover the private key.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735
  (* Security fix *)
x/pixman-0.36.0-x86_64-1.txz:  Upgraded.
xfce/xfce4-terminal-0.8.7.4-x86_64-2.txz:  Rebuilt.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2018-11-22 17:59:46 +01:00
..
luit Slackware 14.2 2018-05-31 23:31:18 +02:00
pixman Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
xauth Mon Aug 27 20:27:22 UTC 2018 2018-08-28 09:00:35 +02:00
xcompmgr Slackware 14.1 2018-05-31 22:57:36 +02:00
xdm Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-intel Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
xf86-video-s3virge Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-tseng Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-voodoo Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-xgixp Slackware 14.2 2018-05-31 23:31:18 +02:00
xinit Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
xorg-server Tue Aug 7 23:24:17 UTC 2018 2018-08-08 09:00:27 +02:00
xpyb Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
luit.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
pixman.patch Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
README Slackware 13.37 2018-05-31 22:45:18 +02:00
xauth.patch Mon Aug 27 20:27:22 UTC 2018 2018-08-28 09:00:35 +02:00
xcompmgr.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xdm.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-apm.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-ark.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-ast.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-dummy.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-glint.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-i128.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-intel.patch Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
xf86-video-nv.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-s3.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-s3virge.patch Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-tga.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-tseng.patch Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-voodoo.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-xgi.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-xgixp.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xinit.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xorg-server.patch Tue Aug 7 23:24:17 UTC 2018 2018-08-08 09:00:27 +02:00
xpyb.patch Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00

IMPORTANT!

To fail/exit a script, use this:

[command that fails] || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }

DO NOT USE THIS:

[command that fails] || exit 1

as it will cause the parent script to exit in the wrong location and possibly
silently skip building some packages.

Thanks,

The Management