Package: libvncserver / 0.9.9+dfsg2-6.1+deb8u3
Metadata
Package | Version | Patches format |
---|---|---|
libvncserver | 0.9.9+dfsg2-6.1+deb8u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
ignore_webclients.patch | (download) |
Makefile.am |
4 2 + 2 - 0 ! |
do not consider webclients directory during build phase |
no_x11vnc_subdir.patch | (download) |
Makefile.am |
6 1 + 5 - 0 ! |
do not build x11vnc |
format_string.patch | (download) |
client_examples/gtkvncviewer.c |
2 1 + 1 - 0 ! |
use format string argument with fprintf. |
multiarch.patch | (download) |
configure.ac |
2 0 + 2 - 0 ! |
avoid regenerating rfb/{rfbconfig,rfbint}.h. |
listenSock.patch | (download) |
libvncserver/sockets.c |
4 2 + 2 - 0 ! |
do not segfault on listensock/listen6sock |
ppc64el.patch | (download) |
acinclude.m4 |
10 8 + 2 - 0 ! |
add support for ppc64el |
pkgconfig.patch | (download) |
libvncclient.pc.in |
4 3 + 1 - 0 ! |
use libs.private to avoid unnecessary linkage |
CVE 2014 6051.patch | (download) |
libvncclient/vncviewer.c |
20 19 + 1 - 0 ! |
fix integer overflow in mallocframebuffer() (cve-2014-6051) Promote integers to uint64_t to avoid integer overflow issue during frame buffer allocation for very large screen sizes |
CVE 2014 6052.patch | (download) |
libvncclient/rfbproto.c |
10 7 + 3 - 0 ! |
check for mallocframebuffer() return value (cve-2014-6052) If MallocFrameBuffer() returns FALSE, frame buffer pointer is left to NULL. Subsequent writes into that buffer could lead to memory corruption, or even arbitrary code execution. |
CVE 2015 6053.patch | (download) |
libvncserver/rfbserver.c |
5 5 + 0 - 0 ! |
check malloc() return value (cve-2014-6053) Check malloc() return value on client->server ClientCutText message. Client can send up to 2**32-1 bytes of text, and such a large allocation is likely to fail in case of high memory pressure. This would in a server crash (write at address 0). |
CVE 2014 6054.patch | (download) |
libvncserver/rfbserver.c |
14 14 + 0 - 0 ! |
do not accept a scaling factor of zero (cve-2014-6054) Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server. |
CVE 2014 6055.patch | (download) |
libvncserver/rfbserver.c |
57 44 + 13 - 0 ! |
--- |
0004 init libgcrypt before use.patch | (download) |
libvncclient/rfbproto.c |
10 10 + 0 - 0 ! |
init libgcrypt before use |
0005 adding free sha1 implementation.patch | (download) |
common/sha-private.h |
29 29 + 0 - 0 ! |
adding free sha1 implementation |
CVE 2016 9941.patch | (download) |
libvncclient/rfbproto.c |
24 24 + 0 - 0 ! |
[patch] fix heap overflows in the various rectangle fill functions Altough rfbproto.c does check whether the overall FramebufferUpdate rectangle is too large, some of the individual encoding decoders do not, which allows a malicious server to overwrite parts of the heap. |
CVE 2016 9942.patch | (download) |
libvncclient/ultra.c |
8 4 + 4 - 0 ! |
[patch] fix heap overflow in the ultra.c decoder The Ultra type tile decoder does not use the _safe variant of the LZO decompress function, which allows a maliciuous server to overwrite parts of the heap by sending a larger-than-specified LZO data stream. |
CVE 2018 7225.patch | (download) |
libvncserver/rfbserver.c |
20 19 + 1 - 0 ! |
cve-2018-7225 Bug-Debian: https://bugs.debian.org/894045 |