slackware-current/source/x/x11/package-blacklist
Patrick J Volkerding 59f80800c2 Tue Apr 11 18:49:02 UTC 2023
a/mcelog-194-x86_64-1.txz:  Upgraded.
a/tcsh-6.24.08-x86_64-1.txz:  Upgraded.
d/meson-1.1.0-x86_64-1.txz:  Upgraded.
d/rust-bindgen-0.65.0-x86_64-1.txz:  Upgraded.
l/mozjs102-102.10.0esr-x86_64-1.txz:  Upgraded.
l/nodejs-19.9.0-x86_64-1.txz:  Upgraded.
l/parted-3.6-x86_64-1.txz:  Upgraded.
x/ibus-table-1.17.0-x86_64-1.txz:  Upgraded.
x/libXfixes-6.0.1-x86_64-1.txz:  Upgraded.
x/libXt-1.3.0-x86_64-1.txz:  Upgraded.
x/xf86-video-neomagic-1.3.1-x86_64-1.txz:  Added.
x/xf86-video-savage-2.4.0-x86_64-1.txz:  Added.
x/xwininfo-1.1.6-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-112.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/112.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#MFSA-TMP-2023-0001
    https://www.cve.org/CVERecord?id=CVE-2023-29531
    https://www.cve.org/CVERecord?id=CVE-2023-29532
    https://www.cve.org/CVERecord?id=CVE-2023-29533
    https://www.cve.org/CVERecord?id=CVE-2023-29534
    https://www.cve.org/CVERecord?id=CVE-2023-29535
    https://www.cve.org/CVERecord?id=CVE-2023-29536
    https://www.cve.org/CVERecord?id=CVE-2023-29537
    https://www.cve.org/CVERecord?id=CVE-2023-29538
    https://www.cve.org/CVERecord?id=CVE-2023-29539
    https://www.cve.org/CVERecord?id=CVE-2023-29540
    https://www.cve.org/CVERecord?id=CVE-2023-29541
    https://www.cve.org/CVERecord?id=CVE-2023-29542
    https://www.cve.org/CVERecord?id=CVE-2023-29543
    https://www.cve.org/CVERecord?id=CVE-2023-29544
    https://www.cve.org/CVERecord?id=CVE-2023-29545
    https://www.cve.org/CVERecord?id=CVE-2023-29546
    https://www.cve.org/CVERecord?id=CVE-2023-29547
    https://www.cve.org/CVERecord?id=CVE-2023-29548
    https://www.cve.org/CVERecord?id=CVE-2023-29549
    https://www.cve.org/CVERecord?id=CVE-2023-29550
    https://www.cve.org/CVERecord?id=CVE-2023-29551
  (* Security fix *)
2023-04-11 21:38:02 +02:00

48 lines
1,016 B
Text

# Enter packages to skip (perhaps because they aren't used on
# this platform) below. Just the package name -- no version
# number is needed.
# ARM only packages:
# They also say in the README for this one that it is not yet ready:
xf86-video-omap
# Obsolete packages:
xf86-input-acecad
xf86-input-aiptek
xf86-input-joystick
xf86-input-keyboard
xf86-input-mouse
xf86-input-penmount
xf86-input-void
xf86-video-apm
xf86-video-ark
xf86-video-ast
xf86-video-chips
xf86-video-cirrus
xf86-video-geode
xf86-video-glint
xf86-video-i128
xf86-video-i740
#xf86-video-neomagic
xf86-video-nv
xf86-video-omap
xf86-video-qxl
xf86-video-rendition
xf86-video-s3
#xf86-video-savage
xf86-video-siliconmotion
xf86-video-sis
xf86-video-sisusb
xf86-video-tdfx
xf86-video-tga
xf86-video-tseng
xf86-video-v4l
xf86-video-vboxvideo
xf86-video-voodoo
xf86-video-xgi
xf86-video-xgixp
# CAREFUL NOT TO "SHIP" THE STUFF BELOW IN THE MAIN X PACKAGES DIR!
# We don't want this one, as it causes failure of X with no xorg.conf
xf86-video-fbdev