SHA256
1
0
forked from pool/freerdp

Accepting request 1036417 from home:weberho:branches:X11:RemoteDesktop

- Ugraded to freerdp 2.9.0
  * Backported #gh:FreeRDP/FreeRDP#8252: Support sending server redirection PDU
  * Backported #gh:FreeRDP/FreeRDP#8406: Ensure X11 client cursor is never
    smaller 1x1
  * Backported #gh:FreeRDP/FreeRDP#8403: Fixed multiple client side input
    validation issues - boo#1205512
    (CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319,
     CVE-2022-39320, CVE-2022-41877, CVE-2022-39347)
  * Backported #7282: Proxy server now discards input events sent before
    activation was received
  * Backported #gh:FreeRDP/FreeRDP#8324: Internal replacements for md4,
    md5 and hmac-md5
    For the time being the RDP protocol requires these outdated hash
    algorithms. So any distribution that wants to ship a working
    FreeRDP should check the options WITH_INTERNAL_MD4 (and depending
    on OpenSSL deprecation status WITH_INTERNAL_MD5)
- Fixed issues:
  * Backported #gh:FreeRDP/FreeRDP#8341: Null checks in winpr_Digest_Free
  * Backported #gh:FreeRDP/FreeRDP#8335: Missing NULL return
    in winpr_Digest_New
  * Backported #gh:FreeRDP/FreeRDP#8192: Support for audin
    version 2 microphone channel
  * Backported #gh:FreeRDP/FreeRDP#7282: Discard input events before
    activation (Fixes #8374)

OBS-URL: https://build.opensuse.org/request/show/1036417
OBS-URL: https://build.opensuse.org/package/show/X11:RemoteDesktop/freerdp?expand=0&rev=137
This commit is contained in:
Hans-Peter Jansen 2022-11-17 16:02:36 +00:00 committed by Git OBS Bridge
parent 278941f12b
commit 6f813cf04a
4 changed files with 33 additions and 4 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:80afdf3fd4304bfc96d4792632660c5fb65ecf5c04c8872cb838a02f4b4cced3
size 7310417

3
FreeRDP-2.9.0.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:ab8de7e962bdc3c34956160de2de8ed28423d39a78452b7686b72c94b1953b27
size 7323451

View File

@ -1,3 +1,32 @@
-------------------------------------------------------------------
Thu Nov 17 08:42:25 UTC 2022 - Johannes Weberhofer <jweberhofer@weberhofer.at>
- Ugraded to freerdp 2.9.0
* Backported #gh:FreeRDP/FreeRDP#8252: Support sending server redirection PDU
* Backported #gh:FreeRDP/FreeRDP#8406: Ensure X11 client cursor is never
smaller 1x1
* Backported #gh:FreeRDP/FreeRDP#8403: Fixed multiple client side input
validation issues - boo#1205512
(CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319,
CVE-2022-39320, CVE-2022-41877, CVE-2022-39347)
* Backported #7282: Proxy server now discards input events sent before
activation was received
* Backported #gh:FreeRDP/FreeRDP#8324: Internal replacements for md4,
md5 and hmac-md5
For the time being the RDP protocol requires these outdated hash
algorithms. So any distribution that wants to ship a working
FreeRDP should check the options WITH_INTERNAL_MD4 (and depending
on OpenSSL deprecation status WITH_INTERNAL_MD5)
- Fixed issues:
* Backported #gh:FreeRDP/FreeRDP#8341: Null checks in winpr_Digest_Free
* Backported #gh:FreeRDP/FreeRDP#8335: Missing NULL return
in winpr_Digest_New
* Backported #gh:FreeRDP/FreeRDP#8192: Support for audin
version 2 microphone channel
* Backported #gh:FreeRDP/FreeRDP#7282: Discard input events before
activation (Fixes #8374)
-------------------------------------------------------------------
Mon Nov 7 11:44:38 UTC 2022 - Johannes Weberhofer <jweberhofer@weberhofer.at>

View File

@ -39,7 +39,7 @@
%endif
Name: freerdp
Version: 2.8.1
Version: 2.9.0
Release: 0
Summary: Remote Desktop Viewer Client
License: Apache-2.0