slackware-current/source/x/x11/patch
Patrick J Volkerding 9cc1c3b360 Wed Jan 18 06:11:54 UTC 2023
ap/diffutils-3.9-x86_64-1.txz:  Upgraded.
ap/lsof-4.97.0-x86_64-1.txz:  Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz:  Upgraded.
d/binutils-2.40-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-11.txz:  Rebuilt.
  Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy allows a backend to trigger HTTP response splitting.
  mod_proxy_ajp possible request smuggling.
  mod_dav out of bounds read, or write of zero byte.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.55
    https://www.cve.org/CVERecord?id=CVE-2022-37436
    https://www.cve.org/CVERecord?id=CVE-2022-36760
    https://www.cve.org/CVERecord?id=CVE-2006-20001
  (* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz:  Upgraded.
  Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.15-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Infinite loop on unclosed comments.
  Runaway loop with width of 0 and enormous height.
  Compression commands depend on $PATH.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-46285
    https://www.cve.org/CVERecord?id=CVE-2022-44617
    https://www.cve.org/CVERecord?id=CVE-2022-4883
  (* Security fix *)
x/libinput-1.22.1-x86_64-1.txz:  Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  Thanks to marav for the build help.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
    https://www.cve.org/CVERecord?id=CVE-2023-23597
    https://www.cve.org/CVERecord?id=CVE-2023-23598
    https://www.cve.org/CVERecord?id=CVE-2023-23599
    https://www.cve.org/CVERecord?id=CVE-2023-23600
    https://www.cve.org/CVERecord?id=CVE-2023-23601
    https://www.cve.org/CVERecord?id=CVE-2023-23602
    https://www.cve.org/CVERecord?id=CVE-2023-23603
    https://www.cve.org/CVERecord?id=CVE-2023-23604
    https://www.cve.org/CVERecord?id=CVE-2023-23605
    https://www.cve.org/CVERecord?id=CVE-2023-23606
  (* Security fix *)
2023-01-18 08:41:55 +01:00
..
luit Slackware 14.2 2018-05-31 23:31:18 +02:00
pixman Tue Apr 21 02:45:06 UTC 2020 2020-04-21 08:59:53 +02:00
xauth Mon Aug 27 20:27:22 UTC 2018 2018-08-28 09:00:35 +02:00
xcompmgr Mon Mar 25 22:36:26 UTC 2019 2019-03-26 08:59:46 +01:00
xf86-video-intel Sun Mar 17 20:40:15 UTC 2019 2019-03-18 08:59:45 +01:00
xf86-video-s3virge Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-tseng Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-voodoo Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-xgixp Slackware 14.2 2018-05-31 23:31:18 +02:00
xinit Fri Jun 19 19:59:04 UTC 2020 2020-06-19 22:41:30 +02:00
xorg-cf-files Tue Apr 20 19:44:02 UTC 2021 2021-04-21 08:59:55 +02:00
xorg-server Mon Dec 19 21:18:22 UTC 2022 2022-12-19 23:42:51 +01:00
xpyb Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
luit.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
pixman.patch Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
README Slackware 13.37 2018-05-31 22:45:18 +02:00
xauth.patch Mon Aug 27 20:27:22 UTC 2018 2018-08-28 09:00:35 +02:00
xcompmgr.patch Mon Mar 25 22:36:26 UTC 2019 2019-03-26 08:59:46 +01:00
xf86-video-apm.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-ark.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-ast.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-dummy.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-glint.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-i128.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-intel.patch Sun Mar 17 20:40:15 UTC 2019 2019-03-18 08:59:45 +01:00
xf86-video-nv.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-s3virge.patch Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-tga.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-tseng.patch Sat Jul 14 21:49:31 UTC 2018 2018-07-15 09:00:34 +02:00
xf86-video-voodoo.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xf86-video-xgi.patch Slackware 14.1 2018-05-31 22:57:36 +02:00
xf86-video-xgixp.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xinit.patch Slackware 14.2 2018-05-31 23:31:18 +02:00
xorg-cf-files.patch Tue Apr 20 19:44:02 UTC 2021 2021-04-21 08:59:55 +02:00
xorg-server.patch Mon Dec 19 21:18:22 UTC 2022 2022-12-19 23:42:51 +01:00
xpyb.patch Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00

IMPORTANT!

To fail/exit a script, use this:

[command that fails] || { touch ${SLACK_X_BUILD_DIR}/${PKGNAME}.failed ; continue ; }

DO NOT USE THIS:

[command that fails] || exit 1

as it will cause the parent script to exit in the wrong location and possibly
silently skip building some packages.

Thanks,

The Management