| 1 | ## Patches with a number < 100 are applied in debian. |
| 2 | ## Ubuntu patches start with 100. |
| 3 | 001_fedora_extramodes.patch |
| 4 | 02_kbsd-input-devd.diff |
| 5 | 03_static-nettle.diff |
| 6 | 05_Revert-Unload-submodules.diff |
| 7 | 06_Revert-fb-reorder-Bresenham-error-correction-to-avoi.diff |
| 8 | 08_xfree86_fix_ia64_inx_outx.diff |
| 9 | |
| 10 | ## Ubuntu patches, not upstreamable |
| 11 | 105_nvidia_fglrx_autodetect.patch |
| 12 | 168_glibc_trace_to_stderr.patch |
| 13 | 188_default_primary_to_first_busid.patch |
| 14 | 190_cache-xkbcomp_output_for_fast_start_up.patch |
| 15 | 191-Xorg-add-an-extra-module-path.patch |
| 16 | 226_fall_back_to_autoconfiguration.patch |
| 17 | |
| 18 | ## send upstream |
| 19 | 232-xf86compatoutput-valgrind.patch |
| 20 | xfree86-no-xv-for-gpuscreens.patch |
| 21 | no-nv.patch |
| 22 | |
| 23 | ## waiting for review by upstream |
| 24 | 111_armel-drv-fallbacks.patch |
| 25 | 122_xext_fix_card32_overflow_in_xauth.patch |
| 26 | # https://bugs.freedesktop.org/show_bug.cgi?id=27134 |
| 27 | # http://lists.x.org/archives/xorg-devel/2010-April/007777.html |
| 28 | # Resent to mailing list, Feb 2013 |
| 29 | 208_switch_on_release.diff |
| 30 | # https://bugs.freedesktop.org/show_bug.cgi?id=865 |
| 31 | # - Violates XKB spec: Section 6.3, SA_LockGroup |
| 32 | # http://lists.freedesktop.org/archives/xorg-devel/2013-January/035046.html |
| 33 | # - Different implementation proposed on fdo mailing list |
| 34 | 227_null_ptr_midispcur.patch |
| 35 | # https://bugs.freedesktop.org/show_bug.cgi?id=24181 |
| 36 | # Probably is just papering over issue; needs further analysis |
| 37 | |
| 38 | ## upstream patches |
| 39 | |
| 40 | # hybrid graphics fixes |
| 41 | 228_autobind_gpu.patch |
| 42 | xf86-fixup-detection.patch |
| 43 | xf86-inactive-gpuscreen.patch |
| 44 | xrandr-rroutputchanged-main.patch |
| 45 | rrcrtc-brackets-are-hard.patch |
| 46 | config-add-no-removal.patch |
| 47 | xf86-ignore-conflicting-rr-caps.patch |
| 48 | fix-detach-gpu.patch |
| 49 | disable-rotation-transform-gpuscreens.patch |
| 50 | |
| 51 | pixman-validate.patch |
| 52 | fix-ftbfs-ppc64el.patch |
| 53 | xmir.patch |
| 54 | drm_device_keep_trying.patch |
| 55 | xi2-resize-touch.patch |
| 56 | xi-dont-copy-too-much.patch |
| 57 | mi-dont-process-disabled.patch |
| 58 | ppc64el-endian-fix.patch |
| 59 | xfree86_allow_fallback_to_pci_bus_probe_for_non_seat0.patch |
| 60 | xfree86_keep_non_seat0_from_touching_vts.patch |
| 61 | xfree86_add_matchseat_key_to_xorg_conf.patch |
| 62 | xfree86_add_matchseat_key_description_to_xorg_conf_man.patch |
| 63 | rotation-slaved-crtc-bounds.patch |
| 64 | fb-24-depth.patch |
| 65 | # Mali fixes |
| 66 | xorg-server-005-mali_fixes.patch |
| 67 | |
| 68 | # CVE-2014-8095 to CVE-2014-8103 |
| 69 | CVE-2014-8xxx/0000-glx-check-return.patch |
| 70 | CVE-2014-8xxx/0000-regionsize-size_t.patch |
| 71 | CVE-2014-8xxx/0001-unchecked-malloc-may-allow-unauthed-client-to-crash-.patch |
| 72 | CVE-2014-8xxx/0002-dix-integer-overflow-in-ProcPutImage-CVE-2014-8092-1.patch |
| 73 | CVE-2014-8xxx/0003-dix-integer-overflow-in-GetHosts-CVE-2014-8092-2-4.patch |
| 74 | CVE-2014-8xxx/0004-dix-integer-overflow-in-RegionSizeof-CVE-2014-8092-3.patch |
| 75 | CVE-2014-8xxx/0005-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-2014-.patch |
| 76 | CVE-2014-8xxx/0006-dri2-integer-overflow-in-ProcDRI2GetBuffers-CVE-2014.patch |
| 77 | CVE-2014-8xxx/0007-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls-CVE-.patch |
| 78 | CVE-2014-8xxx/0008-Xi-unvalidated-lengths-in-Xinput-extension-CVE-2014-.patch |
| 79 | CVE-2014-8xxx/0009-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDList-C.patch |
| 80 | CVE-2014-8xxx/0010-Xv-unvalidated-lengths-in-XVideo-extension-swapped-p.patch |
| 81 | CVE-2014-8xxx/0011-dri3-unvalidated-lengths-in-DRI3-extension-swapped-p.patch |
| 82 | CVE-2014-8xxx/0012-present-unvalidated-lengths-in-Present-extension-pro.patch |
| 83 | CVE-2014-8xxx/0013-randr-unvalidated-lengths-in-RandR-extension-swapped.patch |
| 84 | CVE-2014-8xxx/0014-render-check-request-size-before-reading-it-CVE-2014.patch |
| 85 | CVE-2014-8xxx/0015-render-unvalidated-lengths-in-Render-extn.-swapped-p.patch |
| 86 | CVE-2014-8xxx/0016-xfixes-unvalidated-length-in-SProcXFixesSelectSelect.patch |
| 87 | CVE-2014-8xxx/0017-Add-request-length-checking-test-cases-for-some-Xinp.patch |
| 88 | CVE-2014-8xxx/0018-Add-request-length-checking-test-cases-for-some-Xinp.patch |
| 89 | CVE-2014-8xxx/0019-Add-REQUEST_FIXED_SIZE-testcases-to-test-misc.c.patch |
| 90 | CVE-2014-8xxx/0020-glx-Be-more-paranoid-about-variable-length-requests-.patch |
| 91 | CVE-2014-8xxx/0021-glx-Be-more-strict-about-rejecting-invalid-image-siz.patch |
| 92 | CVE-2014-8xxx/0022-glx-Additional-paranoia-in-__glXGetAnswerBuffer-__GL.patch |
| 93 | CVE-2014-8xxx/0023-glx-Fix-image-size-computation-for-EXT_texture_integ.patch |
| 94 | CVE-2014-8xxx/0024-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6.patch |
| 95 | CVE-2014-8xxx/0025-glx-Length-checking-for-GLXRender-requests-v2-CVE-20.patch |
| 96 | CVE-2014-8xxx/0026-glx-Integer-overflow-protection-for-non-generated-re.patch |
| 97 | CVE-2014-8xxx/0027-glx-Length-checking-for-RenderLarge-requests-v2-CVE-.patch |
| 98 | CVE-2014-8xxx/0028-glx-Top-level-length-checking-for-swapped-VendorPriv.patch |
| 99 | CVE-2014-8xxx/0029-glx-Request-length-checks-for-SetClientInfoARB-CVE-2.patch |
| 100 | CVE-2014-8xxx/0030-glx-Length-checking-for-non-generated-vendor-private.patch |
| 101 | CVE-2014-8xxx/0031-glx-Length-checking-for-non-generated-single-request.patch |
| 102 | CVE-2014-8xxx/0032-glx-Pass-remaining-request-length-into-varsize-v2-CV.patch |
| 103 | CVE-2014-8xxx/0033-glx-Fix-mask-truncation-in-__glXGetAnswerBuffer-CVE-.patch |
| 104 | CVE-2014-8xxx/0034-CVE-2014-8097-additional.patch |
| 105 | CVE-2014-8xxx/0035-CVE-2014-8098-additional.patch |
| 106 | CVE-2014-8xxx/0036-CVE-2014-8092-additional.patch |
| 107 | CVE-2014-8xxx/0037-CVE-2014-8092-additional-2.patch |