Package: libvncserver / 0.9.9+dfsg-6.1

Metadata

Package Version Patches format
libvncserver 0.9.9+dfsg-6.1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
ignore_webclients.patch | (download)

Makefile.am | 4 2 + 2 - 0 !
configure.ac | 3 0 + 3 - 0 !
2 files changed, 2 insertions(+), 5 deletions(-)

 do not consider webclients directory during build phase
no_x11vnc_subdir.patch | (download)

Makefile.am | 6 1 + 5 - 0 !
configure.ac | 303 0 + 303 - 0 !
2 files changed, 1 insertion(+), 308 deletions(-)

 do not build x11vnc
format_string.patch | (download)

client_examples/gtkvncviewer.c | 2 1 + 1 - 0 !
test/encodingstest.c | 2 1 + 1 - 0 !
2 files changed, 2 insertions(+), 2 deletions(-)

 use format string argument with fprintf.
multiarch.patch | (download)

configure.ac | 2 0 + 2 - 0 !
rfb/rfbconfig.h | 4 1 + 3 - 0 !
rfb/rfbint.h | 3 0 + 3 - 0 !
3 files changed, 1 insertion(+), 8 deletions(-)

 avoid regenerating rfb/{rfbconfig,rfbint}.h.
listenSock.patch | (download)

libvncserver/sockets.c | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 do not segfault on listensock/listen6sock
ppc64el.patch | (download)

acinclude.m4 | 10 8 + 2 - 0 !
1 file changed, 8 insertions(+), 2 deletions(-)

 add support for ppc64el
pkgconfig.patch | (download)

libvncclient.pc.in | 4 3 + 1 - 0 !
libvncserver.pc.in | 4 3 + 1 - 0 !
2 files changed, 6 insertions(+), 2 deletions(-)

 use libs.private to avoid unnecessary linkage
CVE 2014 6051.patch | (download)

libvncclient/vncviewer.c | 20 19 + 1 - 0 !
1 file changed, 19 insertions(+), 1 deletion(-)

 fix integer overflow in mallocframebuffer() (cve-2014-6051)
 Promote integers to uint64_t to avoid integer overflow issue during
 frame buffer allocation for very large screen sizes
CVE 2014 6052.patch | (download)

libvncclient/rfbproto.c | 10 7 + 3 - 0 !
libvncclient/vncviewer.c | 3 2 + 1 - 0 !
2 files changed, 9 insertions(+), 4 deletions(-)

  check for mallocframebuffer() return value (cve-2014-6052)
 If MallocFrameBuffer() returns FALSE, frame buffer pointer is left to
 NULL. Subsequent writes into that buffer could lead to memory
 corruption, or even arbitrary code execution.
CVE 2015 6053.patch | (download)

libvncserver/rfbserver.c | 5 5 + 0 - 0 !
1 file changed, 5 insertions(+)

 check malloc() return value (cve-2014-6053)
 Check malloc() return value on client->server ClientCutText
 message. Client can send up to 2**32-1 bytes of text, and such a large
 allocation is likely to fail in case of high memory pressure. This would in a
 server crash (write at address 0).
CVE 2014 6054.patch | (download)

libvncserver/rfbserver.c | 14 14 + 0 - 0 !
1 file changed, 14 insertions(+)

 do not accept a scaling factor of zero (cve-2014-6054)
 Do not accept a scaling factor of zero on
 PalmVNCSetScaleFactor and SetScale client->server messages. This would cause
 a division by zero and crash the server.
CVE 2014 6055.patch | (download)

libvncserver/rfbserver.c | 57 44 + 13 - 0 !
1 file changed, 44 insertions(+), 13 deletions(-)

---