Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/slackware/slackware64/extra/source/tigervnc/patches/xorg-server/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
fix-nouveau-segfault.diff.gz298 B2018-05-30 05:02:41
x11.startwithblackscreen.diff.gz340 B2012-04-14 03:01:32
CVE-2022-46340.correction.patch.gz345 B2022-12-19 18:38:10
fix-pci-segfault.diff.gz357 B2020-09-11 18:38:30
06_use-intel-only-on-pre-gen4.diff.gz418 B2020-12-02 09:50:36
CVE-2023-0494.patch.gz605 B2023-02-07 19:33:33
0001-Always-install-vbe-and-int10-sdk-headers.patch.gz623 B2018-07-15 18:32:31
CVE-2022-3550.patch.gz637 B2022-10-17 18:19:57
CVE-2022-4283.patch.gz664 B2022-12-14 19:20:46
857.patch.gz694 B2023-02-07 19:35:51
CVE-2024-31081.patch.gz751 B2024-04-03 21:43:49
CVE-2024-0229.03.patch.gz781 B2024-01-16 19:44:32
CVE-2023-1393.patch.gz792 B2023-03-29 18:09:25
CVE-2025-26594.02.patch.gz799 B2025-02-25 19:25:41
CVE-2024-31080.patch.gz801 B2024-04-03 21:41:48
CVE-2024-31082.patch.gz803 B2024-04-03 21:43:20
CVE-2025-26597.patch.gz827 B2025-02-25 18:59:35
CVE-2022-3551.patch.gz842 B2022-10-17 18:21:12
CVE-2024-21886.02.patch.gz859 B2024-01-16 19:46:00
CVE-2022-46343.patch.gz863 B2022-12-14 19:22:50
CVE-2025-26596.patch.gz872 B2025-02-25 18:59:05
0001-xfree86-use-modesetting-driver-by-default-on-GeForce.patch.gz879 B2019-02-26 23:17:17
xorg-server.combo.mouse.keyboard.layout.patch.gz897 B2016-04-14 16:42:43
CVE-2025-26601.03.patch.gz901 B2025-02-25 19:03:28
CVE-2022-3553.patch.gz907 B2022-10-17 18:21:57
CVE-2023-6478.patch.gz972 B2023-12-13 20:03:59
CVE-2024-0409.patch.gz981 B2024-01-16 19:46:42
CVE-2025-26594.01.patch.gz986 B2025-02-25 19:18:42
CVE-2023-6816.patch.gz998 B2024-01-16 19:41:49
CVE-2025-26599.01.patch.gz1007 B2025-02-25 19:30:09
CVE-2024-9632.patch.gz1022 B2024-10-30 16:44:18
CVE-2025-26595.patch.gz1.0 KiB2025-02-25 18:58:25
CVE-2022-46344.patch.gz1.0 KiB2022-12-14 19:23:32
CVE-2022-46340.patch.gz1.0 KiB2022-12-14 19:21:24
CVE-2025-26601.02.patch.gz1.0 KiB2025-02-25 19:02:59
CVE-2025-26600.patch.gz1.0 KiB2025-02-25 19:01:31
CVE-2025-26601.01.patch.gz1.1 KiB2025-02-25 19:02:13
CVE-2024-21886.01.patch.gz1.1 KiB2024-01-16 19:45:41
CVE-2023-5367.patch.gz1.1 KiB2023-10-25 18:35:41
CVE-2023-6377.patch.gz1.1 KiB2023-12-13 20:03:04
CVE-2024-0408.patch.gz1.1 KiB2024-01-16 19:47:05
0001-f1070c01d616c5f21f939d5ebc533738779451ac.patch.gz1.1 KiB2022-07-12 17:02:20
CVE-2024-21885.patch.gz1.3 KiB2024-01-16 19:45:17
CVE-2022-46341.patch.gz1.3 KiB2022-12-14 19:21:54
CVE-2024-0229.01.patch.gz1.4 KiB2024-01-16 19:44:03
CVE-2022-46342.patch.gz1.4 KiB2022-12-14 19:22:23
CVE-2025-26598.patch.gz1.4 KiB2025-02-25 19:00:03
CVE-2025-26599.02.patch.gz1.4 KiB2025-02-25 19:01:02
CVE-2025-26601.04.patch.gz1.5 KiB2025-02-25 19:03:58
CVE-2023-5380.patch.gz1.5 KiB2023-10-25 18:40:14
CVE-2024-31083.patch.gz1.6 KiB2024-04-03 22:11:37
0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch.gz1.9 KiB2022-07-12 17:03:34
0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch.gz2.2 KiB2022-07-12 17:03:06
CVE-2024-0229.02.patch.gz2.2 KiB2024-01-16 19:44:20
0001-autobind-GPUs-to-the-screen.patch.gz3.8 KiB2018-07-15 18:32:31