8d7e820a2dAccepting request 1234946 from X11:XOrg
factory
Ana Guerrero
2025-01-06 15:04:34 +00:00
1765d3375b- get rid of %dnl usage (fails on SP7 due to unkonwn macro); also after latest change I now got an autodecline that patches in sources are not mentioned in specfile; just use '#patch ...' now for not applying a patch ...
devel
Stefan Dirsch2025-01-04 19:03:00 +00:00
db8611d389- properly comment out also "PatchXX:" lines; since 'osc service runall source_validator' failed with latest changeStefan Dirsch2025-01-04 18:39:27 +00:00
e5dafcdb78- Properly comment out %patch lines: '#' still expands the macro, which makes build fail with rpm 4.20. Use %dnl instead.Stefan Dirsch2025-01-04 11:20:09 +00:00
a3d641bfbd- Update to relesae 21.1.15 * dix-config.h: add HAVE_SOCKLEN_T definition * config: add a quirk for Apple Silicon appledrm * os: Fix assignment with incompatible pointer type * os: Fix siHostnameAddrMatch in the case where h_addr isn't defined * hw/xfree86: Fix -Wmissing-prototypes warnings * hw/xfree86: Fix -Wincompatible-pointer-types sbus compile failureStefan Dirsch2025-01-04 10:36:31 +00:00
8f6624618dAccepting request 1229142 from X11:XOrg
Ana Guerrero
2024-12-09 20:09:44 +00:00
a39f56179a- re-added and re-enabled u_xfree86-activate-GPU-screens-on-autobind.patch in order to fix the regression of a black screen in login screen (SDDM) on some hybrid graphics Laptop (Intel Meteor Lake-P/ NVIDIA GeForce RTX 4060) (boo#1234301)Stefan Dirsch2024-12-08 19:14:45 +00:00
214bcc86f2Accepting request 1228313 from X11:XOrg
Ana Guerrero
2024-12-05 16:05:20 +00:00
f43fd6f711- no longer apply and remove u_xfree86-activate-GPU-screens-on-autobind.patch since it's no longer needed and might be harmful even ... (tested successfully on Thinkpad P16 with Intel/NVIDIA hybrid graphics) - remove no longer applied and no longer needed patch n_xserver-optimus-autoconfig-hack.patch (feature implemented upstream)Stefan Dirsch2024-12-04 13:20:03 +00:00
5674b3a8faAccepting request 1221609 from X11:XOrg
Ana Guerrero
2024-11-06 15:49:21 +00:00
dd81c855e7Accepting request 1202929 from X11:XOrg
Ana Guerrero
2024-09-25 19:52:50 +00:00
3796c8f146- added conflicts to patterns-wsl-tmpfiles to Xserver packages as this patterns package creates a symlink from /tmp/.X11-unix to /mnt/wslg/.X11-unix and therefore prevents Xservers from creating this needed directory (bsc#1230755)Stefan Dirsch2024-09-24 11:37:25 +00:00
56a97a1764Accepting request 1190943 from X11:XOrg
Dominique Leuenberger
2024-08-02 15:25:34 +00:00
54057616e4rename latest patch according to our X11:XOrg patch guidelinesStefan Dirsch2024-08-01 10:34:24 +00:00
6ff43929b0Accepting request 1189636 from home:jamborm:gcc14test-mStefan Dirsch2024-08-01 10:31:47 +00:00
5e96e458adAccepting request 1188381 from X11:XOrg
Ana Guerrero
2024-07-19 13:25:43 +00:00
d1a7e7ee12- u_fbdevhw_kernel6.9_break_fbdev_open.patch * Linux kernel v6.9 has changed the symlink to point to the parent device. This breaks fbdev_open() detection logic. Change it to use the subsystem symlink instead which will remain stable (gitlab xserver issue#1714)Stefan Dirsch2024-07-18 11:00:29 +00:00
a9de2465e4Accepting request 1180219 from X11:XOrg
Ana Guerrero
2024-06-13 13:37:44 +00:00
2465782129Accepting request 1180145 from home:dgarcia:branches:X11:XOrgStefan Dirsch2024-06-12 13:13:51 +00:00
6a5a8cfee5Accepting request 1166666 from X11:XOrg
Ana Guerrero
2024-04-11 17:40:24 +00:00
7cf27825ed- U_render-Avoid-possible-double-free-in-ProcRenderAddGl.patch * fixes regression for security fix for CVE-2024-31083 (bsc#1222312, boo#1222442, gitlab xserver issue #1659)Stefan Dirsch2024-04-10 13:25:42 +00:00
7861952257Accepting request 1164516 from X11:XOrg
Ana Guerrero
2024-04-04 20:24:46 +00:00
25a7aa1fcd- Security update 21.1.12 This release addresses the following 4 security issues: * CVE-2024-31080 * CVE-2024-31081 * CVE-2024-31082 * CVE-2024-31083 Additionally it provides a way to disable byte-swapped clients either by command line flag or config option. This allows to turn off byte swapping code that has been a source of security problems lately.Stefan Dirsch2024-04-04 08:26:50 +00:00
ea487cfa07Accepting request 1151681 from X11:XOrg
Ana Guerrero
2024-02-27 21:44:47 +00:00
b5c8d1679fAccepting request 1151307 from home:dimstar:rpm4.20:xStefan Dirsch2024-02-26 13:55:25 +00:00
f0d4ba78c8Accepting request 1148344 from X11:XOrg
Ana Guerrero
2024-02-23 15:40:13 +00:00
acf968d516- fix permissions of files in xorg-x11-server-source for tigervnc build later (needed since latest autoconf)Stefan Dirsch2024-02-20 20:40:13 +00:00
041c8cf369Accepting request 1146918 from home:jtorres:branches:X11:XOrgStefan Dirsch2024-02-15 18:36:36 +00:00
31a9dd9b98Accepting request 1146793 from home:jtorres:branches:X11:XOrgStefan Dirsch2024-02-15 11:54:17 +00:00
e61d5aaba0Accepting request 1146120 from X11:XOrg
Ana Guerrero
2024-02-12 17:51:07 +00:00
670f3724ce- Release 21.1.11 also covers fixes for security issue CVE-2022-46340 and bug numbers bsc#1205874, bsc#1217765Stefan Dirsch2024-02-12 10:05:11 +00:00
2e97444477- Release 21.1.11 covers fixes for the following bug numbers, which are not mentioned in this changelog before: bsc#1218845, bsc#1218846, bsc#1216261, bsc#1216133, bsc#1216135Stefan Dirsch2024-02-11 10:31:45 +00:00
a80075e194- xserver sources of this release fixes segfault in Xvnc (bsc#1219311)Stefan Dirsch2024-02-09 20:19:15 +00:00
974b5eefd5Accepting request 1142261 from X11:XOrg
Ana Guerrero
2024-01-30 17:23:54 +00:00
17a63689f9- no longer (build-)require obsolete Xprint/XprintUtilStefan Dirsch2024-01-29 13:10:06 +00:00
9e7dfe9bf7Accepting request 1139223 from X11:XOrg
Ana Guerrero
2024-01-17 21:15:03 +00:00
eac62a3a3b- Update to version 21.1.11 * This release contains fixes for the issues reported in today's security advisory: https://lists.x.org/archives/xorg/2024-January/061525.html * CVE-2023-6816 (bsc#1218582) * CVE-2024-0229 (bsc#1218583) * CVE-2024-21885 (bsc#1218584) * CVE-2024-21886 (bsc#1218585) * CVE-2024-0408 * CVE-2024-0409 - supersedes the following patches * U_xephyr-Don-t-check-for-SeatId-anymore.patch * U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch * U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patchStefan Dirsch2024-01-16 14:20:49 +00:00
4ac071937aAccepting request 1137765 from X11:XOrg
Ana Guerrero
2024-01-10 20:51:05 +00:00
b0f021b69eAccepting request 1137260 from X11:XOrg
Dominique Leuenberger
2024-01-07 20:39:07 +00:00
678de8e366- u_miCloseScreen_check_for_null_pScreen_dev_private.patch * miCloseScreen check for null pScreen dev private (bsc#1218176); another regression introduced by U_bsc1216261-0002-fb-properly-wrap-unwrap-CloseScreen.patchStefan Dirsch2024-01-06 20:07:07 +00:00
605942037e- n_xserver-optimus-autoconfig-hack.patch u_randr-Do-not-crash-if-slave-screen-does-not-have-pro.patch u_xfree86-activate-GPU-screens-on-autobind.patch * check dixPrivateKeyRegistered(rrPrivKey) before calling rrGetScrPriv() to avoid xserver crash when Xinerama is enabled (boo#1218240) -------------------------------------------------------------------Stefan Dirsch2024-01-06 15:21:02 +00:00
8dca7e3f1aAccepting request 1132834 from X11:XOrg
Ana Guerrero
2023-12-14 21:02:29 +00:00
cdc2ed918dAdded missing fixes on U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch.Joan Torres2023-12-13 10:09:44 +00:00
d3adf84eb2- U_bsc1217765-Xi-allocate-enough-XkbActions-for-our-buttons.patch * Out-of-bounds memory write in XKB button actions (CVE-2023-6377, ZDI-CAN-22412, ZDI-CAN-22413, bsc#1217765) - U_bsc1217766-randr-avoid-integer-truncation-in-length-check-of-Pr.patch * Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478, ZDI-CAN-22561, bsc#1217766)Joan Torres2023-12-13 09:18:18 +00:00
28b3701e72Accepting request 1120244 from X11:XOrg
Ana Guerrero
2023-10-25 16:02:08 +00:00
f2b0c39e9f* This release contains fixes for CVE-2023-5367, CVE-2023-5380 and CVE-2023-5574 as reported in today's security advisory:Stefan Dirsch2023-10-25 12:08:03 +00:00
b7578ba345Accepting request 1063640 from X11:XOrg
Dominique Leuenberger
2023-02-08 16:19:52 +00:00
8832186295- Update to version xorg-server-21.1.7: * This release contains the fix for CVE-2023-0494 in today's security advisory: https://lists.x.org/archives/xorg-announce/2023-February/003320.html It also fixes a second possible OOB access during EnqueueEvent and a crasher caused by ResourceClientBits not correctly honouring the MaxClients value in the configuration file. - supersedes U_Xi-fix-potential-use-after-free-in-DeepCopyPointerCl.patch, U_xorg-server-oob-read-enqueue-event.patchStefan Dirsch2023-02-07 14:51:52 +00:00
ba3c661154- Release 21.1 supersedes the following patches still used with xorg-x11-server 1.20.3 on sle15-sp4/Leap 15.4: * U_0002-DRI2-Add-another-Coffeelake-PCI-ID.patch * U_0002-Fix-crash-on-XkbSetMap.patch * U_0003-Fix-crash-on-XkbSetMap.patch * U_0003-dri2-Sync-i965_pci_ids.h-from-mesa.patch * U_0004-dri2-Set-fallback-driver-names-for-Intel-and-AMD-chi.patch * U_0005-dri2-Sync-i965_pci_ids.h-from-mesa-iris_pci_ids.h.patch * U_build-glx-Lower-gl-version-to-work-with-libglvnd.patch * U_glamor-Make-pixmap-exportable-from-gbm_bo_from_pixma.patch * U_hw_do-not-include-sys-io-with-glibc.patch * U_meson-Fix-another-reference-to-gl-9.2.0.patch * U_modesetting-Fix-broken-manpage-in-autoconf-build.patch * U_present-wnmd-Fix-use-after-free-on-CRTC-removal.patch * U_present-wnmd-Relax-assertion-on-CRTC-on-abort_vblank.patch * U_xfree86-Change-displays-array-to-pointers-array-to-f.patch * U_xfree86-Fix-NULL-pointer-dereference-crash.patch * U_xkbsetdeviceinfo.patch * u_sync-pci-ids-with-Mesa-21.2.4.patch * u_xf86-Accept-devices-with-the-simpledrm-driver.patch * u_xichangehierarchy-CVE-2020-14346.patch * u_xkb-CVE-2020-14345.patch * u_xkb-CVE-2020-14360.patchStefan Dirsch2022-11-07 11:50:33 +00:00
ffe2ae973dAccepting request 1032921 from X11:XOrg
Dominique Leuenberger
2022-11-03 18:13:40 +00:00
d87f454ac7- removed N_Disable-HW-Cursor-for-cirrus-and-mgag200-kernel-modules.patch * meanwhile cirrus and mgag200 Kernel drivers have been rewritten multiple times and no longer have (broken) hardware cursorStefan Dirsch2022-11-02 15:48:38 +00:00
afbdf4261aAccepting request 1032916 from home:tdz:branches:X11:XOrgStefan Dirsch2022-11-02 15:36:11 +00:00
80c60bf262Accepting request 1030009 from X11:XOrg
Dominique Leuenberger
2022-10-20 09:10:08 +00:00
89ed3b3595- U_xkb-proof-GetCountedString-against-request-length-at.patch * security update for CVE-2022-3550 (bsc#1204412) - U_xkb-fix-some-possible-memleaks-in-XkbGetKbdByName.patch * security update for CVE-2022-3551 (bsc#1204416)Stefan Dirsch2022-10-19 11:46:42 +00:00
4d0a4b4487Accepting request 990429 from X11:XOrg
Richard Brown
2022-07-22 17:20:24 +00:00
c192e1833c- rename u_sync-pci-ids-with-Mesa-22.0.0.patch to u_sync-pci-ids-with-Mesa.patch (currently synced with Mesa 22.1.3)Stefan Dirsch2022-07-13 14:11:28 +00:00
622390d8ad- u_sync-pci-ids-with-Mesa-22.0.0.patch * synced with Mesa 22.1.3; just adding a PCI ID for vmware was neededStefan Dirsch2022-07-13 14:01:44 +00:00
51271c424a- Update to version 21.1 * This release fixes 2 recently reported security vulnerabilities in xkb, several regressions since 1.20.x and a number of miscellaneous bugs. - supersedes the following security patches * U_boo1194181-001-xkb-swap-XkbSetDeviceInfo-and-XkbSetDeviceInfoCheck.patch * U_boo1194179-001-xkb-rename-xkb_h-to-xkb-procs_h.patch * U_boo1194179-002-xkb-add-request-length-validation-for-XkbSetGeometry.patch - supersedes U_Fix-build-with-gcc-12.patchStefan Dirsch2022-07-13 13:01:53 +00:00
f3f5fb7145Accepting request 988635 from X11:XOrg
Dominique Leuenberger
2022-07-13 12:31:53 +00:00
0b60dd6f9eAccepting request 953300 from X11:XOrg
Dominique Leuenberger
2022-02-11 22:06:40 +00:00
e6988afd0eAccepting request 953299 from home:dirkmueller:branches:openSUSE:Factory:Rings:1-MinimalXStefan Dirsch2022-02-10 20:36:08 +00:00
f53fbcbb27Accepting request 943815 from X11:XOrg
Dominique Leuenberger
2022-01-05 12:39:42 +00:00
9567960c4b- u_xfree86-activate-GPU-screens-on-autobind.patch * Part of the original patch by Dave Airlie has landed 078277e4d92f05a90c4715d61b89b9d9d38d68ea, this contains the remainder of what was in SUSE before Xorg 21.1. (github issue#1254, boo#1192751)Stefan Dirsch2022-01-03 21:11:20 +00:00
af0e317ca9Accepting request 940758 from X11:XOrg
Dominique Leuenberger
2021-12-16 20:18:58 +00:00
f2bfc1dfc5- Update to version 21.1.1 * This release fixes 4 recently reported security vulnerabilities and several regressions. * In particular, the real physical dimensions are no longer reported by the X server anymore as it was deemed to be a too disruptive change. X server will continue to report DPI as 96. - supersedes U_hw-xfree86-Propagate-physical-dimensions-from-DRM-co.patch - supersedes U_rendercompositeglyphs.patch - supersedes U_xfixes-Fix-out-of-bounds-access-in-ProcXFixesCreateP.patch - supersedes U_Xext-Fix-out-of-bounds-access-in-SProcScreenSaverSus.patch - supersedes U_record-Fix-out-of-bounds-access-in-SwapCreateRegiste.patchStefan Dirsch2021-12-15 15:51:39 +00:00
97f1555e30- U_xfixes-Fix-out-of-bounds-access-in-ProcXFixesCreateP.patch * CVE-2021-4009/ZDI-CAN-14950 (bsc#1190487) The handler for the CreatePointerBarrier request of the XFixes extension does not properly validate the request length leading to out of bounds memory write. - U_Xext-Fix-out-of-bounds-access-in-SProcScreenSaverSus.patch * CVE-2021-4010/ZDI-CAN-14951 (bsc#1190488) The handler for the Suspend request of the Screen Saver extension does not properly validate the request length leading to out of bounds memory write. - U_record-Fix-out-of-bounds-access-in-SwapCreateRegiste.patch * CVE-2021-4011/ZDI-CAN-14952 (bsc#1190489) The handlers for the RecordCreateContext and RecordRegisterClients requests of the Record extension do not properly validate the request length leading to out of bounds memory write.Stefan Dirsch2021-12-14 20:27:14 +00:00