1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-02-14 08:48:37 +01:00
slackware-current/patches/source/xorg-server/patch/xorg-server
Patrick J Volkerding 5b606a9169 Wed Mar 29 20:56:21 UTC 2023
patches/packages/glibc-zoneinfo-2023c-noarch-1_slack15.0.txz:  Upgraded.
  This package provides the latest timezone updates.
patches/packages/mozilla-thunderbird-102.9.1-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.9.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-12/
    https://www.cve.org/CVERecord?id=CVE-2023-28427
  (* Security fix *)
patches/packages/xorg-server-1.20.14-x86_64-8_slack15.0.txz:  Rebuilt.
  [PATCH] composite: Fix use-after-free of the COW.
  Fix use-after-free that can lead to local privileges elevation on systems
  where the X server is running privileged and remote code execution for ssh
  X forwarding sessions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-March/003374.html
    https://www.cve.org/CVERecord?id=CVE-2023-1393
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-8_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-8_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-8_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-7_slack15.0.txz:  Rebuilt.
  [PATCH] composite: Fix use-after-free of the COW.
  Fix use-after-free that can lead to local privileges elevation on systems
  where the X server is running privileged and remote code execution for ssh
  X forwarding sessions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-March/003374.html
    https://www.cve.org/CVERecord?id=CVE-2023-1393
  (* Security fix *)
2023-03-30 13:30:41 +02:00
..
0001-Always-install-vbe-and-int10-sdk-headers.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
0001-autobind-GPUs-to-the-screen.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
0001-f1070c01d616c5f21f939d5ebc533738779451ac.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
0001-xfree86-use-modesetting-driver-by-default-on-GeForce.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
06_use-intel-only-on-pre-gen4.diff Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
857.patch Tue Feb 7 20:48:57 UTC 2023 2023-02-08 13:30:32 +01:00
CVE-2022-3550.patch Mon Oct 17 19:31:45 UTC 2022 2022-10-18 13:30:33 +02:00
CVE-2022-3551.patch Mon Oct 17 19:31:45 UTC 2022 2022-10-18 13:30:33 +02:00
CVE-2022-3553.patch Mon Oct 17 19:31:45 UTC 2022 2022-10-18 13:30:33 +02:00
CVE-2022-4283.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2022-46340.correction.patch Mon Dec 19 21:18:22 UTC 2022 2022-12-20 13:30:29 +01:00
CVE-2022-46340.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2022-46341.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2022-46342.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2022-46343.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2022-46344.patch Wed Dec 14 21:19:34 UTC 2022 2022-12-15 13:30:52 +01:00
CVE-2023-0494.patch Tue Feb 7 20:48:57 UTC 2023 2023-02-08 13:30:32 +01:00
CVE-2023-1393.patch Wed Mar 29 20:56:21 UTC 2023 2023-03-30 13:30:41 +02:00
fix-nouveau-segfault.diff Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
fix-pci-segfault.diff Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
x11.startwithblackscreen.diff Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00
xorg-server.combo.mouse.keyboard.layout.patch Wed Jul 13 19:56:59 UTC 2022 2022-07-14 13:30:35 +02:00