12
0

Commit Graph

  • 7cc9578cca Sync changes to SLFO-1.2 branch slfo-main slfo-1.2 Adrian Schröter 2025-08-20 14:22:33 +02:00
  • fd03d6b349 Accepting request 1287668 from X11:XOrg factory Ana Guerrero 2025-06-23 12:55:56 +00:00
  • 7446a32443 - U_CVE-2025-49176-os-Check-for-integer-overflow-on-BigRequest-length.patch * additional fix for CVE-2025-49176 devel Stefan Dirsch 2025-06-22 12:24:21 +00:00
  • 59149ece2e Accepting request 1286394 from X11:XOrg Ana Guerrero 2025-06-18 17:30:29 +00:00
  • 2c7b8ef9b5 - U_CVE-2025-49175-render-Avoid-0-or-less-animated-cursors.patch * Out-of-bounds access in X Rendering extension (Animated cursors) (CVE-2025-49175, bsc#1244082) - U_CVE-2025-49176-os-Do-not-overflow-the-integer-size-with-BigRequest.patch * Integer overflow in Big Requests Extension (CVE-2025-49176, bsc#1244084) - U_CVE-2025-49177-xfixes-Check-request-length-for-SetClientDisconnectM.patch * Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (CVE-2025-49177, bsc#1244085) - U_CVE-2025-49178-os-Account-for-bytes-to-ignore-when-sharing-input-bu.patch * Unprocessed client request via bytes to ignore (CVE-2025-49178, bsc#1244087) - U_CVE-2025-49179-record-Check-for-overflow-in-RecordSanityCheckRegist.patch * Integer overflow in X Record extension (CVE-2025-49179, bsc#1244089) - U_CVE-2025-49180-randr-Check-for-overflow-in-RRChangeProviderProperty.patch U_CVE-2025-49180-xfree86-Check-for-RandR-provider-functions.patch * Integer overflow in RandR extension (RRChangeProviderProperty) (CVE-2025-49180, bsc#1244090) Stefan Dirsch 2025-06-17 14:17:57 +00:00
  • 3041ad84d7 Accepting request 1267280 from X11:XOrg Ana Guerrero 2025-04-08 15:50:00 +00:00
  • 2636acfb03 We have two new kernel drivers coming up that require Xorg workarounds. The patches in this submission request are pending for upstream Xorg, but can already go into TW. Stefan Dirsch 2025-04-05 13:08:41 +00:00
  • 23ca4343bc Accepting request 1254223 from X11:XOrg Ana Guerrero 2025-03-20 18:24:35 +00:00
  • f713bf9163 - U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch * Xorg may crash when client applications use easystroke for mouse gestures (CVE-2022-49737, bsc#1239750) Stefan Dirsch 2025-03-18 18:44:03 +00:00
  • 590ad28c39 Accepting request 1248450 from X11:XOrg Dominique Leuenberger 2025-02-26 16:13:43 +00:00
  • f15e897874 - U_CVE-2025-26594-0001-Cursor-Refuse-to-free-the-root-cursor.patch U_CVE-2025-26594-0002-dix-keep-a-ref-to-the-rootCursor.patch * Use-after-free of the root cursor (CVE-2025-26594, bsc#1237427) - U_CVE-2025-26595-0001-xkb-Fix-buffer-overflow-in-XkbVModMaskText.patch * Buffer overflow in XkbVModMaskText() (CVE-2025-26595, bsc#1237429) - U_CVE-2025-26596-0001-xkb-Fix-computation-of-XkbSizeKeySyms.patch * Heap overflow in XkbWriteKeySyms() (CVE-2025-26596, bsc#1237430) - U_CVE-2025-26597-0001-xkb-Fix-buffer-overflow-in-XkbChangeTypesOfKey.patch * Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597, bsc#1237431) - U_CVE-2025-26598-0001-Xi-Fix-barrier-device-search.patch * Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598, bsc#1237432) - U_CVE-2025-26599-0001-composite-Handle-failure-to-redirect-in-compRedirect.patch U_CVE-2025-26599-0002-composite-initialize-border-clip-even-when-pixmap-al.patch * Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599, bsc#1237433) - U_CVE-2025-26600-0001-dix-Dequeue-pending-events-on-frozen-device-on-remov.patch * Use-after-free in PlayReleasedEvents() (CVE-2025-26600, bsc#1237434) - U_CVE-2025-26601-0001-sync-Do-not-let-sync-objects-uninitialized.patch U_CVE-2025-26601-0002-sync-Check-values-before-applying-changes.patch U_CVE-2025-26601-0003-sync-Do-not-fail-SyncAddTriggerToSyncObject.patch U_CVE-2025-26601-0004-sync-Apply-changes-last-in-SyncChangeAlarmAttributes.patch * Use-after-free in SyncInitTrigger() (CVE-2025-26601, bsc#1237435) Stefan Dirsch 2025-02-25 18:04:55 +00:00
  • 8d7e820a2d Accepting request 1234946 from X11:XOrg Ana Guerrero 2025-01-06 15:04:34 +00:00
  • 1765d3375b - get rid of %dnl usage (fails on SP7 due to unkonwn macro); also after latest change I now got an autodecline that patches in sources are not mentioned in specfile; just use '#patch ...' now for not applying a patch ... Stefan Dirsch 2025-01-04 19:03:00 +00:00
  • db8611d389 - properly comment out also "PatchXX:" lines; since 'osc service runall source_validator' failed with latest change Stefan Dirsch 2025-01-04 18:39:27 +00:00
  • e5dafcdb78 - Properly comment out %patch lines: '#' still expands the macro, which makes build fail with rpm 4.20. Use %dnl instead. Stefan Dirsch 2025-01-04 11:20:09 +00:00
  • a3d641bfbd - Update to relesae 21.1.15 * dix-config.h: add HAVE_SOCKLEN_T definition * config: add a quirk for Apple Silicon appledrm * os: Fix assignment with incompatible pointer type * os: Fix siHostnameAddrMatch in the case where h_addr isn't defined * hw/xfree86: Fix -Wmissing-prototypes warnings * hw/xfree86: Fix -Wincompatible-pointer-types sbus compile failure Stefan Dirsch 2025-01-04 10:36:31 +00:00
  • 8f6624618d Accepting request 1229142 from X11:XOrg Ana Guerrero 2024-12-09 20:09:44 +00:00
  • a39f56179a - re-added and re-enabled u_xfree86-activate-GPU-screens-on-autobind.patch in order to fix the regression of a black screen in login screen (SDDM) on some hybrid graphics Laptop (Intel Meteor Lake-P/ NVIDIA GeForce RTX 4060) (boo#1234301) Stefan Dirsch 2024-12-08 19:14:45 +00:00
  • 214bcc86f2 Accepting request 1228313 from X11:XOrg Ana Guerrero 2024-12-05 16:05:20 +00:00
  • f43fd6f711 - no longer apply and remove u_xfree86-activate-GPU-screens-on-autobind.patch since it's no longer needed and might be harmful even ... (tested successfully on Thinkpad P16 with Intel/NVIDIA hybrid graphics) - remove no longer applied and no longer needed patch n_xserver-optimus-autoconfig-hack.patch (feature implemented upstream) Stefan Dirsch 2024-12-04 13:20:03 +00:00
  • 5674b3a8fa Accepting request 1221609 from X11:XOrg Ana Guerrero 2024-11-06 15:49:21 +00:00
  • e8016ed6b3 - 21.1.14 covers also * CVE-2024-31080 (bsc#1222309) * CVE-2024-31081 (bsc#1222310) * CVE-2024-31082 (bsc#1222311) * CVE-2024-31083 (bsc#1222312) Stefan Dirsch 2024-10-29 19:23:13 +00:00
  • dd81c855e7 Accepting request 1202929 from X11:XOrg Ana Guerrero 2024-09-25 19:52:50 +00:00
  • 3796c8f146 - added conflicts to patterns-wsl-tmpfiles to Xserver packages as this patterns package creates a symlink from /tmp/.X11-unix to /mnt/wslg/.X11-unix and therefore prevents Xservers from creating this needed directory (bsc#1230755) Stefan Dirsch 2024-09-24 11:37:25 +00:00
  • 56a97a1764 Accepting request 1190943 from X11:XOrg Dominique Leuenberger 2024-08-02 15:25:34 +00:00
  • 54057616e4 rename latest patch according to our X11:XOrg patch guidelines 1756699982950120359/tmp_refs/heads/devel 1756699982950120359/devel Stefan Dirsch 2024-08-01 10:34:24 +00:00
  • 6ff43929b0 Accepting request 1189636 from home:jamborm:gcc14test-m Stefan Dirsch 2024-08-01 10:31:47 +00:00
  • 5e96e458ad Accepting request 1188381 from X11:XOrg Ana Guerrero 2024-07-19 13:25:43 +00:00
  • d1a7e7ee12 - u_fbdevhw_kernel6.9_break_fbdev_open.patch * Linux kernel v6.9 has changed the symlink to point to the parent device. This breaks fbdev_open() detection logic. Change it to use the subsystem symlink instead which will remain stable (gitlab xserver issue#1714) Stefan Dirsch 2024-07-18 11:00:29 +00:00
  • a9de2465e4 Accepting request 1180219 from X11:XOrg Ana Guerrero 2024-06-13 13:37:44 +00:00
  • 2465782129 Accepting request 1180145 from home:dgarcia:branches:X11:XOrg Stefan Dirsch 2024-06-12 13:13:51 +00:00
  • 6a5a8cfee5 Accepting request 1166666 from X11:XOrg Ana Guerrero 2024-04-11 17:40:24 +00:00
  • 7cf27825ed - U_render-Avoid-possible-double-free-in-ProcRenderAddGl.patch * fixes regression for security fix for CVE-2024-31083 (bsc#1222312, boo#1222442, gitlab xserver issue #1659) Stefan Dirsch 2024-04-10 13:25:42 +00:00
  • 7861952257 Accepting request 1164516 from X11:XOrg Ana Guerrero 2024-04-04 20:24:46 +00:00
  • 25a7aa1fcd - Security update 21.1.12 This release addresses the following 4 security issues: * CVE-2024-31080 * CVE-2024-31081 * CVE-2024-31082 * CVE-2024-31083 Additionally it provides a way to disable byte-swapped clients either by command line flag or config option. This allows to turn off byte swapping code that has been a source of security problems lately. Stefan Dirsch 2024-04-04 08:26:50 +00:00
  • ea487cfa07 Accepting request 1151681 from X11:XOrg Ana Guerrero 2024-02-27 21:44:47 +00:00
  • b5c8d1679f Accepting request 1151307 from home:dimstar:rpm4.20:x Stefan Dirsch 2024-02-26 13:55:25 +00:00
  • f0d4ba78c8 Accepting request 1148344 from X11:XOrg Ana Guerrero 2024-02-23 15:40:13 +00:00
  • acf968d516 - fix permissions of files in xorg-x11-server-source for tigervnc build later (needed since latest autoconf) Stefan Dirsch 2024-02-20 20:40:13 +00:00
  • 041c8cf369 Accepting request 1146918 from home:jtorres:branches:X11:XOrg Stefan Dirsch 2024-02-15 18:36:36 +00:00
  • 31a9dd9b98 Accepting request 1146793 from home:jtorres:branches:X11:XOrg Stefan Dirsch 2024-02-15 11:54:17 +00:00
  • e61d5aaba0 Accepting request 1146120 from X11:XOrg Ana Guerrero 2024-02-12 17:51:07 +00:00
  • 670f3724ce - Release 21.1.11 also covers fixes for security issue CVE-2022-46340 and bug numbers bsc#1205874, bsc#1217765 Stefan Dirsch 2024-02-12 10:05:11 +00:00
  • 2e97444477 - Release 21.1.11 covers fixes for the following bug numbers, which are not mentioned in this changelog before: bsc#1218845, bsc#1218846, bsc#1216261, bsc#1216133, bsc#1216135 Stefan Dirsch 2024-02-11 10:31:45 +00:00
  • a80075e194 - xserver sources of this release fixes segfault in Xvnc (bsc#1219311) Stefan Dirsch 2024-02-09 20:19:15 +00:00
  • 974b5eefd5 Accepting request 1142261 from X11:XOrg Ana Guerrero 2024-01-30 17:23:54 +00:00
  • 17a63689f9 - no longer (build-)require obsolete Xprint/XprintUtil Stefan Dirsch 2024-01-29 13:10:06 +00:00
  • 9e7dfe9bf7 Accepting request 1139223 from X11:XOrg Ana Guerrero 2024-01-17 21:15:03 +00:00
  • eac62a3a3b - Update to version 21.1.11 * This release contains fixes for the issues reported in today's security advisory: https://lists.x.org/archives/xorg/2024-January/061525.html * CVE-2023-6816 (bsc#1218582) * CVE-2024-0229 (bsc#1218583) * CVE-2024-21885 (bsc#1218584) * CVE-2024-21886 (bsc#1218585) * CVE-2024-0408 * CVE-2024-0409 - supersedes the following patches * U_xephyr-Don-t-check-for-SeatId-anymore.patch * U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch * U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch Stefan Dirsch 2024-01-16 14:20:49 +00:00
  • 4ac071937a Accepting request 1137765 from X11:XOrg Ana Guerrero 2024-01-10 20:51:05 +00:00
  • b0f021b69e Accepting request 1137260 from X11:XOrg Dominique Leuenberger 2024-01-07 20:39:07 +00:00
  • 678de8e366 - u_miCloseScreen_check_for_null_pScreen_dev_private.patch * miCloseScreen check for null pScreen dev private (bsc#1218176); another regression introduced by U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patch Stefan Dirsch 2024-01-06 20:07:07 +00:00
  • 605942037e - n_xserver-optimus-autoconfig-hack.patch u_randr-Do-not-crash-if-slave-screen-does-not-have-pro.patch u_xfree86-activate-GPU-screens-on-autobind.patch * check dixPrivateKeyRegistered(rrPrivKey) before calling rrGetScrPriv() to avoid xserver crash when Xinerama is enabled (boo#1218240) ------------------------------------------------------------------- Stefan Dirsch 2024-01-06 15:21:02 +00:00
  • 8dca7e3f1a Accepting request 1132834 from X11:XOrg Ana Guerrero 2023-12-14 21:02:29 +00:00
  • cdc2ed918d Added missing fixes on U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch. Joan Torres 2023-12-13 10:09:44 +00:00
  • d3adf84eb2 - U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch * Out-of-bounds memory write in XKB button actions (CVE-2023-6377, ZDI-CAN-22412, ZDI-CAN-22413, bsc#1217765) - U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch * Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478, ZDI-CAN-22561, bsc#1217766) Joan Torres 2023-12-13 09:18:18 +00:00
  • 28b3701e72 Accepting request 1120244 from X11:XOrg Ana Guerrero 2023-10-25 16:02:08 +00:00
  • f2b0c39e9f * This release contains fixes for CVE-2023-5367, CVE-2023-5380 and CVE-2023-5574 as reported in today's security advisory: Stefan Dirsch 2023-10-25 12:08:03 +00:00
  • 5df1139ec3 - Update to version 21.1.9 * This release contains fixes for CVE-2023-5367 and CVE-2023-5380 as reported in today's security advisory: https://lists.x.org/archives/xorg-announce/2023-October/003430.html - adjusted u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch Stefan Dirsch 2023-10-25 11:29:21 +00:00
  • b8eaf40ba1 Accepting request 1076666 from X11:XOrg Dominique Leuenberger 2023-04-02 17:16:56 +00:00
  • 2444a577fa Accepting request 1076665 from home:iznogood:branches:X11:XOrg Stefan Dirsch 2023-04-01 18:44:04 +00:00
  • 648f5c3fe3 Accepting request 1076650 from home:iznogood:branches:X11:XOrg Stefan Dirsch 2023-04-01 17:59:31 +00:00
  • 5f4493c278 Accepting request 1075267 from X11:XOrg Dominique Leuenberger 2023-03-30 20:50:52 +00:00
  • d2f12e3cf3 - U_xserver-composite-Fix-use-after-free-of-the-COW.patch * overlay window use-after-free (CVE-2023-1393, ZDI-CAN-19866, bsc#1209543) Stefan Dirsch 2023-03-29 13:38:58 +00:00
  • b7578ba345 Accepting request 1063640 from X11:XOrg Dominique Leuenberger 2023-02-08 16:19:52 +00:00
  • 8832186295 - Update to version xorg-server-21.1.7: * This release contains the fix for CVE-2023-0494 in today's security advisory: https://lists.x.org/archives/xorg-announce/2023-February/003320.html It also fixes a second possible OOB access during EnqueueEvent and a crasher caused by ResourceClientBits not correctly honouring the MaxClients value in the configuration file. - supersedes U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch, U_xorg-server-oob-read-enqueue-event.patch Stefan Dirsch 2023-02-07 14:51:52 +00:00
  • ac6d09dc19 - U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch * DeepCopyPointerClasses use-after-free (CVE-2023-0494, ZDI-CAN-19596, bsc#1207783) Stefan Dirsch 2023-02-07 02:58:41 +00:00
  • d6612caf84 Accepting request 1060975 from X11:XOrg Dominique Leuenberger 2023-01-26 12:57:05 +00:00
  • 130596bd3a fixed patch name in specfile Stefan Dirsch 2023-01-25 16:04:47 +00:00
  • 07094f5b10 - rename u_xorg-server-oob-read-enqueue-event.patch to U_xorg-server-oob-read-enqueue-event.patch since it's already upstream Stefan Dirsch 2023-01-25 16:03:15 +00:00
  • 8dd4b14442 Accepting request 1060712 from home:mgorse:branches:X11:XOrg Stefan Dirsch 2023-01-25 15:59:41 +00:00
  • efa6a83d96 Accepting request 1045913 from X11:XOrg Dominique Leuenberger 2023-01-01 08:38:20 +00:00
  • 810aa51f71 Accepting request 1043805 from home:dirkmueller:Factory Stefan Dirsch 2022-12-31 12:48:22 +00:00
  • 8cc638378f Accepting request 1042895 from X11:XOrg Dominique Leuenberger 2022-12-15 18:24:14 +00:00
  • 37722e6dc6 - U_0007-xkb-reset-the-radio_groups-pointer-to-NULL-after-fre.patch * XkbGetKbdByName use-after-free (ZDI-CAN-19530, CVE-2022-4283, bsc#1206017) Stefan Dirsch 2022-12-14 10:48:59 +00:00
  • 810b863b86 Accepting request 1034269 from X11:XOrg Dominique Leuenberger 2022-11-08 09:53:43 +00:00
  • b449042e84 - Release 21.1 covers bugfixes and JIRA tickets for bsc#1176015,bsc#1182510,bsc#1182884,bsc#1184072,bsc#1184543,bsc#1184906,bsc#1186092,bsc#1188970,bsc#1194159,bsc#1196577,bsc#1197046,bsc#1197269,bsc#1200076,fdo#574,jsc#SLE-18653,jsc#SLE-8470 Stefan Dirsch 2022-11-07 15:26:36 +00:00
  • 1e0cfa540d Accepting request 1034184 from X11:XOrg Dominique Leuenberger 2022-11-07 14:55:55 +00:00
  • eddda1e7f0 No relevant changes Stefan Dirsch 2022-11-07 12:36:09 +00:00
  • ba3c661154 - Release 21.1 supersedes the following patches still used with xorg-x11-server 1.20.3 on sle15-sp4/Leap 15.4: * U_0002-DRI2-Add-another-Coffeelake-PCI-ID.patch * U_0002-Fix-crash-on-XkbSetMap.patch * U_0003-Fix-crash-on-XkbSetMap.patch * U_0003-dri2-Sync-i965_pci_ids.h-from-mesa.patch * U_0004-dri2-Set-fallback-driver-names-for-Intel-and-AMD-chi.patch * U_0005-dri2-Sync-i965_pci_ids.h-from-mesa-iris_pci_ids.h.patch * U_build-glx-Lower-gl-version-to-work-with-libglvnd.patch * U_glamor-Make-pixmap-exportable-from-gbm_bo_from_pixma.patch * U_hw_do-not-include-sys-io-with-glibc.patch * U_meson-Fix-another-reference-to-gl-9.2.0.patch * U_modesetting-Fix-broken-manpage-in-autoconf-build.patch * U_present-wnmd-Fix-use-after-free-on-CRTC-removal.patch * U_present-wnmd-Relax-assertion-on-CRTC-on-abort_vblank.patch * U_xfree86-Change-displays-array-to-pointers-array-to-f.patch * U_xfree86-Fix-NULL-pointer-dereference-crash.patch * U_xkbsetdeviceinfo.patch * u_sync-pci-ids-with-Mesa-21.2.4.patch * u_xf86-Accept-devices-with-the-simpledrm-driver.patch * u_xichangehierarchy-CVE-2020-14346.patch * u_xkb-CVE-2020-14345.patch * u_xkb-CVE-2020-14360.patch Stefan Dirsch 2022-11-07 11:50:33 +00:00
  • ffe2ae973d Accepting request 1032921 from X11:XOrg Dominique Leuenberger 2022-11-03 18:13:40 +00:00
  • d87f454ac7 - removed N_Disable-HW-Cursor-for-cirrus-and-mgag200-kernel-modules.patch * meanwhile cirrus and mgag200 Kernel drivers have been rewritten multiple times and no longer have (broken) hardware cursor Stefan Dirsch 2022-11-02 15:48:38 +00:00
  • afbdf4261a Accepting request 1032916 from home:tdz:branches:X11:XOrg Stefan Dirsch 2022-11-02 15:36:11 +00:00
  • 80c60bf262 Accepting request 1030009 from X11:XOrg Dominique Leuenberger 2022-10-20 09:10:08 +00:00
  • 89ed3b3595 - U_xkb-proof-GetCountedString-against-request-length-at.patch * security update for CVE-2022-3550 (bsc#1204412) - U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch * security update for CVE-2022-3551 (bsc#1204416) Stefan Dirsch 2022-10-19 11:46:42 +00:00
  • 4d0a4b4487 Accepting request 990429 from X11:XOrg Richard Brown 2022-07-22 17:20:24 +00:00
  • c192e1833c - rename u_sync-pci-ids-with-Mesa-22.0.0.patch to u_sync-pci-ids-with-Mesa.patch (currently synced with Mesa 22.1.3) Stefan Dirsch 2022-07-13 14:11:28 +00:00
  • 622390d8ad - u_sync-pci-ids-with-Mesa-22.0.0.patch * synced with Mesa 22.1.3; just adding a PCI ID for vmware was needed Stefan Dirsch 2022-07-13 14:01:44 +00:00
  • 51271c424a - Update to version 21.1 * This release fixes 2 recently reported security vulnerabilities in xkb, several regressions since 1.20.x and a number of miscellaneous bugs. - supersedes the following security patches * U_boo1194181-001-xkb-swap-XkbSetDeviceInfo-and-XkbSetDeviceInfoCheck.patch * U_boo1194179-001-xkb-rename-xkb_h-to-xkb-procs_h.patch * U_boo1194179-002-xkb-add-request-length-validation-for-XkbSetGeometry.patch - supersedes U_Fix-build-with-gcc-12.patch Stefan Dirsch 2022-07-13 13:01:53 +00:00
  • f3f5fb7145 Accepting request 988635 from X11:XOrg Dominique Leuenberger 2022-07-13 12:31:53 +00:00
  • 70daf87975 - U_boo1194181-001-xkb-swap-XkbSetDeviceInfo-and-XkbSetDeviceInfoCheck.patch * Out-Of-Bounds Access in CheckSetDeviceIndicators() (CVE-2022-2320, ZDI-CAN-16070, bsc#1194181) - U_boo1194179-001-xkb-rename-xkb_h-to-xkb-procs_h.patch, U_boo1194179-002-xkb-add-request-length-validation-for-XkbSetGeometry.patch * Out-Of-Bounds Access in _CheckSetSections() (CVE-2022-2319, ZDI-CAN-16062, bsc#1194179) Stefan Dirsch 2022-07-12 13:29:47 +00:00
  • bbc928ae72 Accepting request 976070 from X11:XOrg Dominique Leuenberger 2022-05-12 20:57:46 +00:00
  • b764ccdbd2 Accepting request 976069 from home:dirkmueller:Factory Stefan Dirsch 2022-05-10 13:06:39 +00:00
  • 572dce0726 Accepting request 966769 from X11:XOrg Dominique Leuenberger 2022-04-06 19:51:06 +00:00
  • ae96915ab1 adding bugtracking number for -z now linking Stefan Dirsch 2022-04-04 09:07:34 +00:00
  • 8e3900c83e Accepting request 966041 from home:msmeissn:branches:X11:XOrg Stefan Dirsch 2022-04-04 08:42:54 +00:00
  • 183d5c909e Accepting request 961428 from X11:XOrg Dominique Leuenberger 2022-03-15 18:04:19 +00:00
  • 347490b213 - u_sync-pci-ids-with-Mesa-22.0.0.patch * sync pci ids with Mesa 22.0.0 Stefan Dirsch 2022-03-13 10:13:29 +00:00
  • eae68a1dc8 Accepting request 956864 from X11:XOrg Dominique Leuenberger 2022-02-23 15:25:58 +00:00
  • 7656de906a Accepting request 956857 from home:iznogood:branches:X11:XOrg Stefan Dirsch 2022-02-22 20:39:31 +00:00