SHA256
1
0
forked from pool/freerdp
freerdp/FreeRDP-2.9.0.tar.gz
Hans-Peter Jansen 6f813cf04a Accepting request 1036417 from home:weberho:branches:X11:RemoteDesktop
- Ugraded to freerdp 2.9.0
  * Backported #gh:FreeRDP/FreeRDP#8252: Support sending server redirection PDU
  * Backported #gh:FreeRDP/FreeRDP#8406: Ensure X11 client cursor is never
    smaller 1x1
  * Backported #gh:FreeRDP/FreeRDP#8403: Fixed multiple client side input
    validation issues - boo#1205512
    (CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319,
     CVE-2022-39320, CVE-2022-41877, CVE-2022-39347)
  * Backported #7282: Proxy server now discards input events sent before
    activation was received
  * Backported #gh:FreeRDP/FreeRDP#8324: Internal replacements for md4,
    md5 and hmac-md5
    For the time being the RDP protocol requires these outdated hash
    algorithms. So any distribution that wants to ship a working
    FreeRDP should check the options WITH_INTERNAL_MD4 (and depending
    on OpenSSL deprecation status WITH_INTERNAL_MD5)
- Fixed issues:
  * Backported #gh:FreeRDP/FreeRDP#8341: Null checks in winpr_Digest_Free
  * Backported #gh:FreeRDP/FreeRDP#8335: Missing NULL return
    in winpr_Digest_New
  * Backported #gh:FreeRDP/FreeRDP#8192: Support for audin
    version 2 microphone channel
  * Backported #gh:FreeRDP/FreeRDP#7282: Discard input events before
    activation (Fixes #8374)

OBS-URL: https://build.opensuse.org/request/show/1036417
OBS-URL: https://build.opensuse.org/package/show/X11:RemoteDesktop/freerdp?expand=0&rev=137
2022-11-17 16:02:36 +00:00

4 lines
132 B
Plaintext

version https://git-lfs.github.com/spec/v1
oid sha256:ab8de7e962bdc3c34956160de2de8ed28423d39a78452b7686b72c94b1953b27
size 7323451