- Update to version 1.20.0:
New features:
+ RANDR 1.6, which enables leasing RANDR resources to a client for its
exclusive use (e.g. head mounted displays)
+ Depth 30 support in glamor and the modesetting driver
+ A meson-based build system, parallel to autotools
+ Pageflipping support for PRIME output sinks
+ OutputClass device matching for xorg.conf
+ Input grab and tablet support in Xwayland
- Remove upstream patches:
+ u_xorg-x11-server-reproducible.patch
Solved slightly different
+ u_os-inputthread-Force-unlock-when-stopping-thread.patch
+ u_xfree86-add-default-modes-for-16-9-and-16-10.patch
+ U_xwayland-Don-t-process-cursor-warping-without-an-xwl.patch
+ U_xwayland-Give-up-cleanly-on-Wayland-socket-errors.patch
+ U_xwayland-avoid-race-condition-on-new-keymap.patch
+ U_xwayland-remove-dirty-window-unconditionally-on-unre.patch
- Adapt patches to work with the new release:
+ N_zap_warning_xserver.diff
+ N_fix_fglrx_screendepth_issue.patch
+ n_xserver-optimus-autoconfig-hack.patch
+ u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch
+ u_xorg-wrapper-build-Build-position-independent-code.patch
OBS-URL: https://build.opensuse.org/request/show/610640
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xorg-x11-server?expand=0&rev=702
- Update to version 1.19.4:
A collection of stability fixes from the development branch, including
two minor CVEs (CVE-2017-13721, CVE-2017-13723).
- Remove upstream patches:
+ U_Xi-Do-not-try-to-swap-GenericEvent.patch
+ U_Xi-Verify-all-events-in-ProcXSendExtensionEvent.patch
+ U_Xi-Zero-target-buffer-in-SProcXSendExtensionEvent.patch
+ U_dix-Disallow-GenericEvent-in-SendEvent-request.patch
- Adapt patches to work with the new release:
+ u_Use-better-fallbacks-to-generate-cookies-if-arc4rand.patch
OBS-URL: https://build.opensuse.org/request/show/531711
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xorg-x11-server?expand=0&rev=676
If arc4random_buf() is not available for generating cookies:
* use getentropy(), if available (which was only recently added to
glibc)
* use getrandom() via syscall(), if available (there was no glibc
wrapper for this syscall for a long time)
* if all else fails, directly read from /dev/urandom as before, but
employ O_CLOEXEC, do an OsAbort() in case the random data couldn't be
read to avoid unsecure situations. Don't know if that's too hard a
measure but it shouldn't actually occur except on maximum number of
FDs reached
(bsc#1025084)
OBS-URL: https://build.opensuse.org/package/show/X11:XOrg/xorg-x11-server?expand=0&rev=671