Package: ssvnc / 1.0.29-4+deb10u1
Metadata
Package | Version | Patches format |
---|---|---|
ssvnc | 1.0.29-4+deb10u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
confusing_ h.patch | (download) |
scripts/ssvnc |
7 4 + 3 - 0 ! |
improve handling of -h[e[l[p]]] Catches -he and -hel as well, instead of letting wish print its usage message (that sounds like an error message). |
ultraftp_path.patch | (download) |
vnc_unixsrc/vncviewer/argsresources.c |
31 2 + 29 - 0 ! |
use hardcoded (and correct for the debian package) path to ultraftp.jar if SSVNC_ULTRA_FTP_JAR is unset. |
nostrip.patch | (download) |
Makefile |
1 0 + 1 - 0 ! |
don't strip ssvncviewer; let dh_strip handle that (or not, depending on build options) |
buildflags.patch | (download) |
Makefile |
6 3 + 3 - 0 ! |
pass cflags and ldflags to xmkmf-generated makefiles Pass CFLAGS and LDFLAGS through via ./Makefile as CDEBUGFLAGS and LOCAL_LDFLAGS to vnc_unixsrc/*/Makefile |
format security.patch | (download) |
vnc_unixsrc/vncviewer/sockets.c |
16 8 + 8 - 0 ! |
fix format-security warnings/errors Replaces fprintf(stderr, str) with fputs(str, stderr) (where str in most cases is argv[0]) and also one instance of sprintf (without format string) with snprintf (with format string). |
openssl1.1.patch | (download) |
vncstorepw/ultravnc_dsm_helper.c |
58 32 + 26 - 0 ! |
--- |
auto scale.patch | (download) |
vnc_unixsrc/vncviewer/desktop.c |
60 26 + 34 - 0 ! |
make autoscaling work. 1) Add a StructureNotifyMask event handler to be notified of windows resizings, rather than checking for size changes twice every second in the Expose handler. Using the size of "form" seems to work best. Skip checking for pressed mouse buttons - those shouldn't matter in this situation, and the old code aborted if modifier keys were pressed or Caps Lock or Num Lock active. 2) Avoid freaking out if the windows haven't been realized yet - instead use scale factor 1. This prevented setting -scale auto on the command line from working. Bug: https://sourceforge.net/p/ssvnc/bugs/5/ Bug-Debian: https://bugs.debian.org/801804 Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ssvnc/+bug/1312966 |
samemachine_ip6_overflow.patch | (download) |
vnc_unixsrc/vncviewer/rfbproto.c |
4 2 + 2 - 0 ! |
use a struct sockaddr_storage to retrieve local and peer addresses and compare according to address family. Also check if -rawlocal was specified before even checking whether the remote machine is the local one. Bug-Debian: https://bugs.debian.org/774622 |
libvncclient_CVE 2018 20020.patch | (download) |
vnc_unixsrc/vncviewer/corre.c |
2 1 + 1 - 0 ! |
cve-2018-20020 heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution |
libvncclient_CVE 2018 20021.patch | (download) |
vnc_unixsrc/vncviewer/rfbproto.c |
2 1 + 1 - 0 ! |
cve-2018-20021 CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM |
libvncclient_CVE 2018 20022.patch | (download) |
vnc_unixsrc/vncviewer/rfbproto.c |
2 2 + 0 - 0 ! |
cve-2018-20022 multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR |
libvncclient_CVE 2018 20024.patch | (download) |
vnc_unixsrc/vncviewer/zlib.c |
5 5 + 0 - 0 ! |
cve-2018-20024 null pointer dereference in VNC client code that can result DoS. |