ODROID-U3 xorg-server debian package fork :
authorJérôme Benoit <jerome.benoit@piment-noir.org>
Mon, 22 Dec 2014 20:13:19 +0000 (21:13 +0100)
committerJérôme Benoit <jerome.benoit@piment-noir.org>
Mon, 22 Dec 2014 20:13:19 +0000 (21:13 +0100)
commit4db25562fe97995f20b8adc0f2e6959ed82e8635
treeb17c27de514a365742af3e14ad5f047f0bcc80cb
parent7217e0ca50bba73dad94782e67980aeeb24ab693
ODROID-U3 xorg-server debian package fork :

* Add Mali fixes patch;
* Refresh patches list.

Signed-off-by: Jérôme Benoit <jerome.benoit@piment-noir.org>
82 files changed:
debian/changelog
debian/gbp.conf
debian/patches/02_kbsd-input-devd.diff
debian/patches/03_static-nettle.diff
debian/patches/05_Revert-Unload-submodules.diff
debian/patches/06_Revert-fb-reorder-Bresenham-error-correction-to-avoi.diff
debian/patches/105_nvidia_fglrx_autodetect.patch
debian/patches/111_armel-drv-fallbacks.patch
debian/patches/122_xext_fix_card32_overflow_in_xauth.patch
debian/patches/168_glibc_trace_to_stderr.patch
debian/patches/188_default_primary_to_first_busid.patch
debian/patches/190_cache-xkbcomp_output_for_fast_start_up.patch
debian/patches/191-Xorg-add-an-extra-module-path.patch
debian/patches/208_switch_on_release.diff
debian/patches/226_fall_back_to_autoconfiguration.patch
debian/patches/227_null_ptr_midispcur.patch
debian/patches/228_autobind_gpu.patch
debian/patches/232-xf86compatoutput-valgrind.patch
debian/patches/CVE-2014-8xxx/0000-glx-check-return.patch
debian/patches/CVE-2014-8xxx/0000-regionsize-size_t.patch
debian/patches/CVE-2014-8xxx/0001-unchecked-malloc-may-allow-unauthed-client-to-crash-.patch
debian/patches/CVE-2014-8xxx/0002-dix-integer-overflow-in-ProcPutImage-CVE-2014-8092-1.patch
debian/patches/CVE-2014-8xxx/0003-dix-integer-overflow-in-GetHosts-CVE-2014-8092-2-4.patch
debian/patches/CVE-2014-8xxx/0004-dix-integer-overflow-in-RegionSizeof-CVE-2014-8092-3.patch
debian/patches/CVE-2014-8xxx/0005-dix-integer-overflow-in-REQUEST_FIXED_SIZE-CVE-2014-.patch
debian/patches/CVE-2014-8xxx/0006-dri2-integer-overflow-in-ProcDRI2GetBuffers-CVE-2014.patch
debian/patches/CVE-2014-8xxx/0007-dbe-unvalidated-lengths-in-DbeSwapBuffers-calls-CVE-.patch
debian/patches/CVE-2014-8xxx/0008-Xi-unvalidated-lengths-in-Xinput-extension-CVE-2014-.patch
debian/patches/CVE-2014-8xxx/0009-xcmisc-unvalidated-length-in-SProcXCMiscGetXIDList-C.patch
debian/patches/CVE-2014-8xxx/0010-Xv-unvalidated-lengths-in-XVideo-extension-swapped-p.patch
debian/patches/CVE-2014-8xxx/0011-dri3-unvalidated-lengths-in-DRI3-extension-swapped-p.patch
debian/patches/CVE-2014-8xxx/0012-present-unvalidated-lengths-in-Present-extension-pro.patch
debian/patches/CVE-2014-8xxx/0013-randr-unvalidated-lengths-in-RandR-extension-swapped.patch
debian/patches/CVE-2014-8xxx/0014-render-check-request-size-before-reading-it-CVE-2014.patch
debian/patches/CVE-2014-8xxx/0015-render-unvalidated-lengths-in-Render-extn.-swapped-p.patch
debian/patches/CVE-2014-8xxx/0016-xfixes-unvalidated-length-in-SProcXFixesSelectSelect.patch
debian/patches/CVE-2014-8xxx/0017-Add-request-length-checking-test-cases-for-some-Xinp.patch
debian/patches/CVE-2014-8xxx/0018-Add-request-length-checking-test-cases-for-some-Xinp.patch
debian/patches/CVE-2014-8xxx/0019-Add-REQUEST_FIXED_SIZE-testcases-to-test-misc.c.patch
debian/patches/CVE-2014-8xxx/0020-glx-Be-more-paranoid-about-variable-length-requests-.patch
debian/patches/CVE-2014-8xxx/0021-glx-Be-more-strict-about-rejecting-invalid-image-siz.patch
debian/patches/CVE-2014-8xxx/0022-glx-Additional-paranoia-in-__glXGetAnswerBuffer-__GL.patch
debian/patches/CVE-2014-8xxx/0023-glx-Fix-image-size-computation-for-EXT_texture_integ.patch
debian/patches/CVE-2014-8xxx/0024-glx-Add-safe_-add-mul-pad-v3-CVE-2014-8093-4-6.patch
debian/patches/CVE-2014-8xxx/0025-glx-Length-checking-for-GLXRender-requests-v2-CVE-20.patch
debian/patches/CVE-2014-8xxx/0026-glx-Integer-overflow-protection-for-non-generated-re.patch
debian/patches/CVE-2014-8xxx/0027-glx-Length-checking-for-RenderLarge-requests-v2-CVE-.patch
debian/patches/CVE-2014-8xxx/0028-glx-Top-level-length-checking-for-swapped-VendorPriv.patch
debian/patches/CVE-2014-8xxx/0029-glx-Request-length-checks-for-SetClientInfoARB-CVE-2.patch
debian/patches/CVE-2014-8xxx/0030-glx-Length-checking-for-non-generated-vendor-private.patch
debian/patches/CVE-2014-8xxx/0031-glx-Length-checking-for-non-generated-single-request.patch
debian/patches/CVE-2014-8xxx/0032-glx-Pass-remaining-request-length-into-varsize-v2-CV.patch
debian/patches/CVE-2014-8xxx/0033-glx-Fix-mask-truncation-in-__glXGetAnswerBuffer-CVE-.patch
debian/patches/CVE-2014-8xxx/0034-CVE-2014-8097-additional.patch
debian/patches/CVE-2014-8xxx/0035-CVE-2014-8098-additional.patch
debian/patches/CVE-2014-8xxx/0036-CVE-2014-8092-additional.patch
debian/patches/CVE-2014-8xxx/0037-CVE-2014-8092-additional-2.patch
debian/patches/config-add-no-removal.patch
debian/patches/disable-rotation-transform-gpuscreens.patch
debian/patches/drm_device_keep_trying.patch
debian/patches/fb-24-depth.patch
debian/patches/fix-detach-gpu.patch
debian/patches/fix-ftbfs-ppc64el.patch
debian/patches/mi-dont-process-disabled.patch
debian/patches/no-nv.patch
debian/patches/pixman-validate.patch
debian/patches/ppc64el-endian-fix.patch
debian/patches/rotation-slaved-crtc-bounds.patch
debian/patches/rrcrtc-brackets-are-hard.patch
debian/patches/series
debian/patches/xf86-fixup-detection.patch
debian/patches/xf86-ignore-conflicting-rr-caps.patch
debian/patches/xf86-inactive-gpuscreen.patch
debian/patches/xfree86-no-xv-for-gpuscreens.patch
debian/patches/xfree86_add_matchseat_key_description_to_xorg_conf_man.patch
debian/patches/xfree86_add_matchseat_key_to_xorg_conf.patch
debian/patches/xfree86_allow_fallback_to_pci_bus_probe_for_non_seat0.patch
debian/patches/xfree86_keep_non_seat0_from_touching_vts.patch
debian/patches/xi-dont-copy-too-much.patch
debian/patches/xi2-resize-touch.patch
debian/patches/xmir.patch
debian/patches/xrandr-rroutputchanged-main.patch