Commit Graph

  • ae5c90f000 bsc#1247887 slfo-main Petr Gajdos 2025-10-20 16:05:35 +02:00
  • 2bb6e34835 bsc#1247887 slfo-1.2 Petr Gajdos 2025-08-26 11:54:03 +02:00
  • 1b92d8ce0c Accepting request 1288668 from devel:libraries:c_c++ factory Ana Guerrero 2025-06-27 21:00:17 +00:00
  • 3d6c239422 checkin Petr Gajdos 2025-06-26 11:08:06 +00:00
  • ace3f4612f Accepting request 1288647 from home:krop:branches:devel:libraries:c_c++ Petr Gajdos 2025-06-26 11:04:22 +00:00
  • abb94dbac9 Accepting request 1094908 from devel:libraries:c_c++ Dominique Leuenberger 2023-06-24 18:13:28 +00:00
  • faefa057ba Accepting request 1094908 from devel:libraries:c_c++ Dominique Leuenberger 2023-06-24 18:13:28 +00:00
  • 34179ea7cb - version update to 0.9.14 ## Overall changes: * Added more documentation (build system integration, repeater setup) and a legal FAQ. * Added [contribution guidelines](CONTRIBUTING.md). * Ported the TravisCI continous integration machinery to GitHub workflows. ## LibVNCServer/LibVNCClient: * Added [qemu extended key event]. * Fixed several potential multiplication overflows. ## LibVNCClient: * Fixes of several memory leaks and buffer overflows. * Added UltraVNC's MSLogonII authentication scheme. * Fixed TLS interoperability with GnuTLS servers. * Fixed detection of newer UltraVNC and TightVNC servers. * Added support for [SetDesktopSize]. * Added SSH tunneling example using libssh2. * Added some extensions to VeNCrypt in order to be compatible with a wider range of servers. ## LibVNCServer: * Fixes to the multi-threaded server implementation which should be a lot more sound now. * Fixed TightVNC-filetransfer file upload for 64-bit systems. * Fixes of crashes in the zlib compression. * Added support for [UTF8 clipboard data]. * Fixed visual artifacts in framebuffer on ARM platforms. * Fixed several WebSockets bugs. * Fixed the UltraVNC-style repeater example. * Added support for larger framebuffers (two 4k screens possible now). * Added support for timeouts for outbound connections (to repeaters for instance). * Fixed out-of-bounds memory access in Tight encoding. - modified patches % 0001-libvncserver-Add-API-to-add-custom-I-O-entry-points.patch (refreshed) % 0002-libvncserver-Add-channel-security-handlers.patch (refreshed) Petr Gajdos 2023-06-23 14:47:24 +00:00
  • 3f8ca4a0dc - version update to 0.9.14 ## Overall changes: * Added more documentation (build system integration, repeater setup) and a legal FAQ. * Added [contribution guidelines](CONTRIBUTING.md). * Ported the TravisCI continous integration machinery to GitHub workflows. ## LibVNCServer/LibVNCClient: * Added [qemu extended key event]. * Fixed several potential multiplication overflows. ## LibVNCClient: * Fixes of several memory leaks and buffer overflows. * Added UltraVNC's MSLogonII authentication scheme. * Fixed TLS interoperability with GnuTLS servers. * Fixed detection of newer UltraVNC and TightVNC servers. * Added support for [SetDesktopSize]. * Added SSH tunneling example using libssh2. * Added some extensions to VeNCrypt in order to be compatible with a wider range of servers. ## LibVNCServer: * Fixes to the multi-threaded server implementation which should be a lot more sound now. * Fixed TightVNC-filetransfer file upload for 64-bit systems. * Fixes of crashes in the zlib compression. * Added support for [UTF8 clipboard data]. * Fixed visual artifacts in framebuffer on ARM platforms. * Fixed several WebSockets bugs. * Fixed the UltraVNC-style repeater example. * Added support for larger framebuffers (two 4k screens possible now). * Added support for timeouts for outbound connections (to repeaters for instance). * Fixed out-of-bounds memory access in Tight encoding. - modified patches % 0001-libvncserver-Add-API-to-add-custom-I-O-entry-points.patch (refreshed) % 0002-libvncserver-Add-channel-security-handlers.patch (refreshed) Petr Gajdos 2023-06-23 14:47:24 +00:00
  • 8dfed1cd29 Accepting request 1001885 from devel:libraries:c_c++ Dominique Leuenberger 2022-09-09 16:22:19 +00:00
  • d55e1a6efd Accepting request 1001885 from devel:libraries:c_c++ Dominique Leuenberger 2022-09-09 16:22:19 +00:00
  • 5288f14c75 - security update - added patches fix CVE-2020-29260 [bsc#1203106], memory leakage via rfbClientCleanup() + LibVNCServer-CVE-2020-29260.patch Petr Gajdos 2022-09-08 08:26:49 +00:00
  • e2851b4d2f - security update - added patches fix CVE-2020-29260 [bsc#1203106], memory leakage via rfbClientCleanup() + LibVNCServer-CVE-2020-29260.patch Petr Gajdos 2022-09-08 08:26:49 +00:00
  • a2a696afcb Accepting request 919689 from devel:libraries:c_c++ Dominique Leuenberger 2021-09-21 19:12:26 +00:00
  • 8c316c4d01 Accepting request 919689 from devel:libraries:c_c++ Dominique Leuenberger 2021-09-21 19:12:26 +00:00
  • eda0463099 - purposedly adding just this changelog entry - previous version updates fixed also: * CVE-2020-14398 [bsc#1173880] -- improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c * CVE-2017-18922 [bsc#1173477] -- preauth buffer overwrite * CVE-2018-20748 [bsc#1123823] -- libvnc contains multiple heap out-of-bounds writes * CVE-2020-25708 [bsc#1178682] -- libvncserver/rfbserver.c has a divide by zero which could result in DoS * CVE-2018-21247 [bsc#1173874] -- uninitialized memory contents are vulnerable to Information leak * CVE-2018-20750 [bsc#1123832] -- heap out-of-bounds write vulnerability in libvncserver/rfbserver.c * CVE-2020-14397 [bsc#1173700] -- NULL pointer dereference in libvncserver/rfbregion.c * CVE-2019-20839 [bsc#1173875] -- buffer overflow in ConnectClientToUnixSock() * CVE-2020-14401 [bsc#1173694] -- potential integer overflows in libvncserver/scale.c * CVE-2020-14400 [bsc#1173691] -- Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. * CVE-2019-20840 [bsc#1173876] -- unaligned accesses in hybiReadAndDecode can lead to denial of service * CVE-2020-14399 [bsc#1173743] -- Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. * CVE-2020-14402 [bsc#1173701] -- out-of-bounds access via encodings. * CVE-2020-14403 [bsc#1173701] * CVE-2020-14404 [bsc#1173701] Petr Gajdos 2021-09-17 09:13:27 +00:00
  • 0019a553ed - purposedly adding just this changelog entry - previous version updates fixed also: * CVE-2020-14398 [bsc#1173880] -- improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c * CVE-2017-18922 [bsc#1173477] -- preauth buffer overwrite * CVE-2018-20748 [bsc#1123823] -- libvnc contains multiple heap out-of-bounds writes * CVE-2020-25708 [bsc#1178682] -- libvncserver/rfbserver.c has a divide by zero which could result in DoS * CVE-2018-21247 [bsc#1173874] -- uninitialized memory contents are vulnerable to Information leak * CVE-2018-20750 [bsc#1123832] -- heap out-of-bounds write vulnerability in libvncserver/rfbserver.c * CVE-2020-14397 [bsc#1173700] -- NULL pointer dereference in libvncserver/rfbregion.c * CVE-2019-20839 [bsc#1173875] -- buffer overflow in ConnectClientToUnixSock() * CVE-2020-14401 [bsc#1173694] -- potential integer overflows in libvncserver/scale.c * CVE-2020-14400 [bsc#1173691] -- Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. * CVE-2019-20840 [bsc#1173876] -- unaligned accesses in hybiReadAndDecode can lead to denial of service * CVE-2020-14399 [bsc#1173743] -- Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. * CVE-2020-14402 [bsc#1173701] -- out-of-bounds access via encodings. * CVE-2020-14403 [bsc#1173701] * CVE-2020-14404 [bsc#1173701] Petr Gajdos 2021-09-17 09:13:27 +00:00
  • a3eea2d2a6 Accepting request 862815 from devel:libraries:c_c++ Dominique Leuenberger 2021-01-18 10:26:13 +00:00
  • 6f9118cd65 Accepting request 862815 from devel:libraries:c_c++ Dominique Leuenberger 2021-01-18 10:26:13 +00:00
  • 2a437571c2 Accepting request 862813 from home:fcrozat:branches:devel:libraries:c_c++ Petr Gajdos 2021-01-13 08:22:31 +00:00
  • cb5eea6ef7 Accepting request 862813 from home:fcrozat:branches:devel:libraries:c_c++ Petr Gajdos 2021-01-13 08:22:31 +00:00
  • 2a94164a4f Accepting request 862644 from home:fcrozat:branches:devel:libraries:c_c++ Petr Gajdos 2021-01-13 07:09:21 +00:00
  • 0e53e93d63 Accepting request 862644 from home:fcrozat:branches:devel:libraries:c_c++ Petr Gajdos 2021-01-13 07:09:21 +00:00
  • 281e07edae Accepting request 817795 from devel:libraries:c_c++ Dominique Leuenberger 2020-07-01 16:22:08 +00:00
  • 24ea2607d9 Accepting request 817795 from devel:libraries:c_c++ Dominique Leuenberger 2020-07-01 16:22:08 +00:00
  • b53ff28ae7 - version update to 0.9.13 [bsc#1173477] Petr Gajdos 2020-06-30 06:52:30 +00:00
  • c16faa1dd8 - version update to 0.9.13 [bsc#1173477] Petr Gajdos 2020-06-30 06:52:30 +00:00
  • f0e1496500 - version update to 0.9.13 ## Overall changes: * Small tweaks to the CMake build system. * The macOS server example was overhauled and is now the most feature-complete sample application of the project, ready for real-world use. * Lots of documentation updates and markdownifying. * The TravisCI continuous integration now also build-checks cross-compilation from Linux to Windows. * Setup a [Gitter community chat](https://gitter.im/LibVNC/libvncserver) for the project. ## LibVNCServer/LibVNCClient: * Both LibVNCServer and LibVNCClient now support an additional platform, namely Microsoft Windows. Building is supported with Visual Studio as well as MingGW. * The separate crypto routines used by LibVNCClient and LibVNCServer were refactored into an implementation common to both libraries. * Several security issues got fixed. * The bundled noVNC client is now at version 1.1.0 and included via a git submodule. ## LibVNCClient: * Added connect timeout as well as read timeout support thanks to Tobias Junghans. * Both TLS backends now do proper locking of network operations when multi-threaded thanks to Gaurav Ujjwal. * Fixed regression in Tight/Raw decoding introduced in 0.9.12 thanks to DRC. * Fixed encrypted connections to AnonTLS servers when using the OpenSSL back-end. Made possible by the profound research done by Gaurav Ujjwal. ## LibVNCServer: * Added a hooking function (clientFramebufferUpdateRequestHook) to deliver rfbFramebufferUpdateRequest messages from clients to the frame producer thanks to Jae Hyun Yoo. * Added SetDesktopSize/ExtendedDesktopSize support thanks to Floris Bos. * Added multi-threading support for MS Windows. * Fixed VNC repeater/proxy functionality that was broken in 0.9.12. Petr Gajdos 2020-06-30 06:51:13 +00:00
  • 8fed7fb8c3 - version update to 0.9.13 ## Overall changes: * Small tweaks to the CMake build system. * The macOS server example was overhauled and is now the most feature-complete sample application of the project, ready for real-world use. * Lots of documentation updates and markdownifying. * The TravisCI continuous integration now also build-checks cross-compilation from Linux to Windows. * Setup a [Gitter community chat](https://gitter.im/LibVNC/libvncserver) for the project. ## LibVNCServer/LibVNCClient: * Both LibVNCServer and LibVNCClient now support an additional platform, namely Microsoft Windows. Building is supported with Visual Studio as well as MingGW. * The separate crypto routines used by LibVNCClient and LibVNCServer were refactored into an implementation common to both libraries. * Several security issues got fixed. * The bundled noVNC client is now at version 1.1.0 and included via a git submodule. ## LibVNCClient: * Added connect timeout as well as read timeout support thanks to Tobias Junghans. * Both TLS backends now do proper locking of network operations when multi-threaded thanks to Gaurav Ujjwal. * Fixed regression in Tight/Raw decoding introduced in 0.9.12 thanks to DRC. * Fixed encrypted connections to AnonTLS servers when using the OpenSSL back-end. Made possible by the profound research done by Gaurav Ujjwal. ## LibVNCServer: * Added a hooking function (clientFramebufferUpdateRequestHook) to deliver rfbFramebufferUpdateRequest messages from clients to the frame producer thanks to Jae Hyun Yoo. * Added SetDesktopSize/ExtendedDesktopSize support thanks to Floris Bos. * Added multi-threading support for MS Windows. * Fixed VNC repeater/proxy functionality that was broken in 0.9.12. Petr Gajdos 2020-06-30 06:51:13 +00:00
  • d86a9342f4 Accepting request 800071 from devel:libraries:c_c++ Dominique Leuenberger 2020-05-07 15:49:40 +00:00
  • dba8113a63 Accepting request 800071 from devel:libraries:c_c++ Dominique Leuenberger 2020-05-07 15:49:40 +00:00
  • 5bfbbc96fa - deleted patches - LibVNCServer-CVE-2018-20749.patch (mistakenly added, it is already part of 0.9.12) Petr Gajdos 2020-05-04 13:50:18 +00:00
  • cc7f4421b3 - deleted patches - LibVNCServer-CVE-2018-20749.patch (mistakenly added, it is already part of 0.9.12) Petr Gajdos 2020-05-04 13:50:18 +00:00
  • dc2b77f4c6 Accepting request 798132 from devel:libraries:c_c++ Dominique Leuenberger 2020-04-29 18:41:20 +00:00
  • 1a1739c3fe Accepting request 798132 from devel:libraries:c_c++ Dominique Leuenberger 2020-04-29 18:41:20 +00:00
  • 796592bc8f - security update - added patches fix CVE-2019-15690 [bsc#1160471], heap buffer overflow + LibVNCServer-CVE-2019-15690.patch fix CVE-2019-20788 [bsc#1170441], integer overflow and heap-based buffer overflow via a large height or width value + LibVNCServer-CVE-2019-20788.patch Petr Gajdos 2020-04-27 09:23:22 +00:00
  • 5422bb83da - security update - added patches fix CVE-2019-15690 [bsc#1160471], heap buffer overflow + LibVNCServer-CVE-2019-15690.patch fix CVE-2019-20788 [bsc#1170441], integer overflow and heap-based buffer overflow via a large height or width value + LibVNCServer-CVE-2019-20788.patch Petr Gajdos 2020-04-27 09:23:22 +00:00
  • 65bebe09c0 Accepting request 762624 from devel:libraries:c_c++ Dominique Leuenberger 2020-01-12 22:18:05 +00:00
  • 41e9b6f2a7 Accepting request 762624 from devel:libraries:c_c++ Dominique Leuenberger 2020-01-12 22:18:05 +00:00
  • 9950d776ae Accepting request 762623 from home:favogt:branches:devel:libraries:c_c++ Petr Gajdos 2020-01-10 08:50:06 +00:00
  • 89d37b0378 Accepting request 762623 from home:favogt:branches:devel:libraries:c_c++ Petr Gajdos 2020-01-10 08:50:06 +00:00
  • a08f697f88 Accepting request 745157 from devel:libraries:c_c++ Dominique Leuenberger 2019-11-08 14:21:50 +00:00
  • d2b41d7fb3 Accepting request 745157 from devel:libraries:c_c++ Dominique Leuenberger 2019-11-08 14:21:50 +00:00
  • ad5db89a6b - turn the test suite on Petr Gajdos 2019-11-04 11:29:42 +00:00
  • de5f3529c7 - turn the test suite on Petr Gajdos 2019-11-04 11:29:42 +00:00
  • 596ae64df8 - security update - added patches CVE-2019-15681 [bsc#1155419] + LibVNCServer-CVE-2019-15681.patch Petr Gajdos 2019-11-04 10:27:40 +00:00
  • a0357195c4 - security update - added patches CVE-2019-15681 [bsc#1155419] + LibVNCServer-CVE-2019-15681.patch Petr Gajdos 2019-11-04 10:27:40 +00:00
  • 3ab352a3fd Accepting request 741008 from openSUSE:Factory Petr Gajdos 2019-10-18 09:15:52 +00:00
  • b7c907cc33 Accepting request 741008 from openSUSE:Factory Petr Gajdos 2019-10-18 09:15:52 +00:00
  • b58022b44a Accepting request 739228 from home:RBrownSUSE:branches:devel:libraries:c_c++ Petr Gajdos 2019-10-17 12:26:05 +00:00
  • a82a7e4808 Accepting request 739228 from home:RBrownSUSE:branches:devel:libraries:c_c++ Petr Gajdos 2019-10-17 12:26:05 +00:00
  • b69128c8bd Accepting request 679220 from devel:libraries:c_c++ Dominique Leuenberger 2019-03-01 15:46:08 +00:00
  • bfa2d6db54 Accepting request 679220 from devel:libraries:c_c++ Dominique Leuenberger 2019-03-01 15:46:08 +00:00
  • 241c8e9bef Accepting request 679156 from home:zhangxiaofei:branches:devel:libraries:c_c++ Petr Gajdos 2019-02-26 11:09:03 +00:00
  • fc78204a68 Accepting request 679156 from home:zhangxiaofei:branches:devel:libraries:c_c++ Petr Gajdos 2019-02-26 11:09:03 +00:00
  • aeaa1a102a - security update * CVE-2018-20749 [bsc#1123828] + LibVNCServer-CVE-2018-20749.patch Petr Gajdos 2019-02-11 12:08:31 +00:00
  • 8d98483b16 - security update * CVE-2018-20749 [bsc#1123828] + LibVNCServer-CVE-2018-20749.patch Petr Gajdos 2019-02-11 12:08:31 +00:00
  • c86db330b8 Accepting request 673256 from home:pgajdos Dirk Mueller 2019-02-11 12:01:51 +00:00
  • de0bf161e5 Accepting request 673256 from home:pgajdos Dirk Mueller 2019-02-11 12:01:51 +00:00
  • e444f91661 Accepting request 671855 from home:pgajdos Jan Engelhardt 2019-02-05 15:10:38 +00:00
  • 7850fc4f5e Accepting request 671855 from home:pgajdos Jan Engelhardt 2019-02-05 15:10:38 +00:00
  • 84dd974a59 - Fix devel package dependencies Adam Majer 2019-01-11 14:11:46 +00:00
  • 4eb122ee50 - Fix devel package dependencies Adam Majer 2019-01-11 14:11:46 +00:00
  • f764faba55 Accepting request 662702 from home:pgajdos Adam Majer 2019-01-07 10:02:55 +00:00
  • 8eb02d9dfb Accepting request 662702 from home:pgajdos Adam Majer 2019-01-07 10:02:55 +00:00
  • ad92219d6d Accepting request 607448 from devel:libraries:c_c++ Dominique Leuenberger 2018-05-19 13:40:56 +00:00
  • 61ba035da1 Accepting request 607448 from devel:libraries:c_c++ Dominique Leuenberger 2018-05-19 13:40:56 +00:00
  • 9d95543798 Accepting request 605744 from home:kbabioch:branches:devel:libraries:c_c++ Adam Majer 2018-05-15 10:30:59 +00:00
  • e6964133b5 Accepting request 605744 from home:kbabioch:branches:devel:libraries:c_c++ Adam Majer 2018-05-15 10:30:59 +00:00
  • 7918ae0630 Accepting request 397918 from devel:libraries:c_c++ Dominique Leuenberger 2016-05-31 10:10:17 +00:00
  • 124b376b6a Accepting request 397918 from devel:libraries:c_c++ Dominique Leuenberger 2016-05-31 10:10:17 +00:00
  • aaeeed14cb Accepting request 397781 from home:1Antoine1:branches:devel:libraries:c_c++ Dirk Mueller 2016-05-25 10:25:38 +00:00
  • f1877af09f Accepting request 397781 from home:1Antoine1:branches:devel:libraries:c_c++ Dirk Mueller 2016-05-25 10:25:38 +00:00
  • 4b5853064d Accepting request 285635 from devel:libraries:c_c++ Dominique Leuenberger 2015-02-14 12:45:03 +00:00
  • 4757f2bd39 Accepting request 285635 from devel:libraries:c_c++ Dominique Leuenberger 2015-02-14 12:45:03 +00:00
  • ddc9afdae4 Accepting request 284719 from home:elvigia:branches:devel:libraries:c_c++ Marcus Meissner 2015-02-11 13:05:29 +00:00
  • 78536b672d Accepting request 284719 from home:elvigia:branches:devel:libraries:c_c++ Marcus Meissner 2015-02-11 13:05:29 +00:00
  • dd349cc601 Accepting request 265357 from devel:libraries:c_c++ Dominique Leuenberger 2014-12-17 18:19:27 +00:00
  • 2addca9ae2 Accepting request 265357 from devel:libraries:c_c++ Dominique Leuenberger 2014-12-17 18:19:27 +00:00
  • a535b959f1 - Ismail Dönmez 2014-12-16 09:25:43 +00:00
  • ccfdb43029 - Ismail Dönmez 2014-12-16 09:25:43 +00:00
  • 348f91bb03 - Ismail Dönmez 2014-12-14 10:03:22 +00:00
  • c0df725dcb - Ismail Dönmez 2014-12-14 10:03:22 +00:00
  • 48bfbc4217 Accepting request 265083 from home:posophe:branches:devel:libraries:c_c++ Ismail Dönmez 2014-12-13 17:38:38 +00:00
  • 6717cc7067 Accepting request 265083 from home:posophe:branches:devel:libraries:c_c++ Ismail Dönmez 2014-12-13 17:38:38 +00:00
  • 0d0d2ecea1 Accepting request 254050 from devel:libraries:c_c++ Stephan Kulow 2014-10-06 10:06:08 +00:00
  • 9d78195079 Accepting request 254050 from devel:libraries:c_c++ Stephan Kulow 2014-10-06 10:06:08 +00:00
  • 070bb97862 Accepting request 253912 from home:olh:branches:devel:libraries:c_c++ Cristian Rodríguez 2014-10-05 18:32:01 +00:00
  • bfbc74c986 Accepting request 253912 from home:olh:branches:devel:libraries:c_c++ Cristian Rodríguez 2014-10-05 18:32:01 +00:00
  • 9ca8ca1c2c Accepting request 239171 from devel:libraries:c_c++ Stephan Kulow 2014-07-08 14:58:47 +00:00
  • 7e36966355 Accepting request 239171 from devel:libraries:c_c++ Stephan Kulow 2014-07-08 14:58:47 +00:00
  • 1100ec1380 - remove old .bz2 file Stephan Kulow 2014-07-01 13:35:45 +00:00
  • 9822e0b46a - remove old .bz2 file Stephan Kulow 2014-07-01 13:35:45 +00:00
  • 913bb8158b Remove unused excess sources Jan Engelhardt 2013-06-21 15:40:33 +00:00
  • b07590e21a Remove unused excess sources Jan Engelhardt 2013-06-21 15:40:33 +00:00
  • 045dfc9df3 Accepting request 159812 from devel:libraries:c_c++ Stephan Kulow 2013-03-20 10:49:09 +00:00
  • 6b0c8c6f2c Accepting request 159812 from devel:libraries:c_c++ Stephan Kulow 2013-03-20 10:49:09 +00:00
  • 2415d604bf Accepting request 159783 from home:m_meister:branches:openSUSE:Factory Ismail Dönmez 2013-03-18 14:07:52 +00:00
  • c687c1bc3c Accepting request 159783 from home:m_meister:branches:openSUSE:Factory Ismail Dönmez 2013-03-18 14:07:52 +00:00
  • 20bba0f125 Accepting request 148186 from home:jengelh:branches:devel:libraries:c_c++ Cristian Rodríguez 2013-01-13 15:30:19 +00:00