2636acfb03We have two new kernel drivers coming up that require Xorg workarounds. The patches in this submission request are pending for upstream Xorg, but can already go into TW.Stefan Dirsch2025-04-05 13:08:41 +00:00
f713bf9163- U_CVE-2022-49737-dix-Hold-input-lock-for-AttachDevice.patch * Xorg may crash when client applications use easystroke for mouse gestures (CVE-2022-49737, bsc#1239750)Stefan Dirsch2025-03-18 18:44:03 +00:00
1765d3375b- get rid of %dnl usage (fails on SP7 due to unkonwn macro); also after latest change I now got an autodecline that patches in sources are not mentioned in specfile; just use '#patch ...' now for not applying a patch ...Stefan Dirsch2025-01-04 19:03:00 +00:00
db8611d389- properly comment out also "PatchXX:" lines; since 'osc service runall source_validator' failed with latest changeStefan Dirsch2025-01-04 18:39:27 +00:00
e5dafcdb78- Properly comment out %patch lines: '#' still expands the macro, which makes build fail with rpm 4.20. Use %dnl instead.Stefan Dirsch2025-01-04 11:20:09 +00:00
a3d641bfbd- Update to relesae 21.1.15 * dix-config.h: add HAVE_SOCKLEN_T definition * config: add a quirk for Apple Silicon appledrm * os: Fix assignment with incompatible pointer type * os: Fix siHostnameAddrMatch in the case where h_addr isn't defined * hw/xfree86: Fix -Wmissing-prototypes warnings * hw/xfree86: Fix -Wincompatible-pointer-types sbus compile failureStefan Dirsch2025-01-04 10:36:31 +00:00
a39f56179a- re-added and re-enabled u_xfree86-activate-GPU-screens-on-autobind.patch in order to fix the regression of a black screen in login screen (SDDM) on some hybrid graphics Laptop (Intel Meteor Lake-P/ NVIDIA GeForce RTX 4060) (boo#1234301)Stefan Dirsch2024-12-08 19:14:45 +00:00
f43fd6f711- no longer apply and remove u_xfree86-activate-GPU-screens-on-autobind.patch since it's no longer needed and might be harmful even ... (tested successfully on Thinkpad P16 with Intel/NVIDIA hybrid graphics) - remove no longer applied and no longer needed patch n_xserver-optimus-autoconfig-hack.patch (feature implemented upstream)Stefan Dirsch2024-12-04 13:20:03 +00:00
3796c8f146- added conflicts to patterns-wsl-tmpfiles to Xserver packages as this patterns package creates a symlink from /tmp/.X11-unix to /mnt/wslg/.X11-unix and therefore prevents Xservers from creating this needed directory (bsc#1230755)Stefan Dirsch2024-09-24 11:37:25 +00:00
d1a7e7ee12- u_fbdevhw_kernel6.9_break_fbdev_open.patch * Linux kernel v6.9 has changed the symlink to point to the parent device. This breaks fbdev_open() detection logic. Change it to use the subsystem symlink instead which will remain stable (gitlab xserver issue#1714)Stefan Dirsch2024-07-18 11:00:29 +00:00
25a7aa1fcd- Security update 21.1.12 This release addresses the following 4 security issues: * CVE-2024-31080 * CVE-2024-31081 * CVE-2024-31082 * CVE-2024-31083 Additionally it provides a way to disable byte-swapped clients either by command line flag or config option. This allows to turn off byte swapping code that has been a source of security problems lately.Stefan Dirsch2024-04-04 08:26:50 +00:00
acf968d516- fix permissions of files in xorg-x11-server-source for tigervnc build later (needed since latest autoconf)Stefan Dirsch2024-02-20 20:40:13 +00:00
041c8cf369Accepting request 1146918 from home:jtorres:branches:X11:XOrgStefan Dirsch2024-02-15 18:36:36 +00:00
31a9dd9b98Accepting request 1146793 from home:jtorres:branches:X11:XOrgStefan Dirsch2024-02-15 11:54:17 +00:00
670f3724ce- Release 21.1.11 also covers fixes for security issue CVE-2022-46340 and bug numbers bsc#1205874, bsc#1217765Stefan Dirsch2024-02-12 10:05:11 +00:00
2e97444477- Release 21.1.11 covers fixes for the following bug numbers, which are not mentioned in this changelog before: bsc#1218845, bsc#1218846, bsc#1216261, bsc#1216133, bsc#1216135Stefan Dirsch2024-02-11 10:31:45 +00:00
a80075e194- xserver sources of this release fixes segfault in Xvnc (bsc#1219311)Stefan Dirsch2024-02-09 20:19:15 +00:00
678de8e366- u_miCloseScreen_check_for_null_pScreen_dev_private.patch * miCloseScreen check for null pScreen dev private (bsc#1218176); another regression introduced by U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patchStefan Dirsch2024-01-06 20:07:07 +00:00
605942037e- n_xserver-optimus-autoconfig-hack.patch u_randr-Do-not-crash-if-slave-screen-does-not-have-pro.patch u_xfree86-activate-GPU-screens-on-autobind.patch * check dixPrivateKeyRegistered(rrPrivKey) before calling rrGetScrPriv() to avoid xserver crash when Xinerama is enabled (boo#1218240) -------------------------------------------------------------------Stefan Dirsch2024-01-06 15:21:02 +00:00
f2b0c39e9f* This release contains fixes for CVE-2023-5367, CVE-2023-5380 and CVE-2023-5574 as reported in today's security advisory:Stefan Dirsch2023-10-25 12:08:03 +00:00
8832186295- Update to version xorg-server-21.1.7: * This release contains the fix for CVE-2023-0494 in today's security advisory: https://lists.x.org/archives/xorg-announce/2023-February/003320.html It also fixes a second possible OOB access during EnqueueEvent and a crasher caused by ResourceClientBits not correctly honouring the MaxClients value in the configuration file. - supersedes U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch, U_xorg-server-oob-read-enqueue-event.patchStefan Dirsch2023-02-07 14:51:52 +00:00
d87f454ac7- removed N_Disable-HW-Cursor-for-cirrus-and-mgag200-kernel-modules.patch * meanwhile cirrus and mgag200 Kernel drivers have been rewritten multiple times and no longer have (broken) hardware cursorStefan Dirsch2022-11-02 15:48:38 +00:00
afbdf4261aAccepting request 1032916 from home:tdz:branches:X11:XOrgStefan Dirsch2022-11-02 15:36:11 +00:00
c192e1833c- rename u_sync-pci-ids-with-Mesa-22.0.0.patch to u_sync-pci-ids-with-Mesa.patch (currently synced with Mesa 22.1.3)Stefan Dirsch2022-07-13 14:11:28 +00:00
622390d8ad- u_sync-pci-ids-with-Mesa-22.0.0.patch * synced with Mesa 22.1.3; just adding a PCI ID for vmware was neededStefan Dirsch2022-07-13 14:01:44 +00:00
51271c424a- Update to version 21.1 * This release fixes 2 recently reported security vulnerabilities in xkb, several regressions since 1.20.x and a number of miscellaneous bugs. - supersedes the following security patches * U_boo1194181-001-xkb-swap-XkbSetDeviceInfo-and-XkbSetDeviceInfoCheck.patch * U_boo1194179-001-xkb-rename-xkb_h-to-xkb-procs_h.patch * U_boo1194179-002-xkb-add-request-length-validation-for-XkbSetGeometry.patch - supersedes U_Fix-build-with-gcc-12.patchStefan Dirsch2022-07-13 13:01:53 +00:00