| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: LibVNCServer-devel | Distribution: openSUSE Tumbleweed |
| Version: 0.9.15 | Vendor: openSUSE |
| Release: 1.1 | Build date: Thu Jun 26 09:53:57 2025 |
| Group: Development/Libraries/X11 | Build host: reproducible |
| Size: 814989 | Source RPM: LibVNCServer-0.9.15-1.1.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://github.com/LibVNC/libvncserver | |
| Summary: VNC Development Library | |
VNC is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to "export" a frame buffer via the network. It is already in wide use for administration, but it is not that easy to program a server yourself. This has been changed by LibVNCServer. X.org already has a virtual Xvnc server which you can start as an own screen (e.g. :1) and connect to with a VNC client (e.g. vncviewer from tightvnc). The LibVNCServer-devel package contains the static libraries and header files for LibVNCServer.
GPL-2.0-or-later
* Thu Jun 26 2025 Christophe Marin <christophe@krop.fr>
- Update to 0.9.15
https://github.com/LibVNC/libvncserver/releases/tag/LibVNCServer-0.9.15
* internal code structure cleanup
* UTF-8 clipboard handling improvements
* HTTP server support for multithreaded VNC servers
* Fixed building with OpenSSL >= 3.0.0
- Rebase patches
- Fix devel package dependencies. The libraries have public link
targets that must be present when LibVNCServer-devel is
installed
- Add upstream change to fix build failures with CMake 4:
* 0001-CMake-require-at-least-CMake-3.5.patch
- Spec refresh
* Fri Jun 23 2023 pgajdos@suse.com
- version update to 0.9.14
[#]# Overall changes:
* Added more documentation (build system integration, repeater setup) and a legal FAQ.
* Added [contribution guidelines](CONTRIBUTING.md).
* Ported the TravisCI continous integration machinery to GitHub workflows.
[#]# LibVNCServer/LibVNCClient:
* Added [qemu extended key event].
* Fixed several potential multiplication overflows.
[#]# LibVNCClient:
* Fixes of several memory leaks and buffer overflows.
* Added UltraVNC's MSLogonII authentication scheme.
* Fixed TLS interoperability with GnuTLS servers.
* Fixed detection of newer UltraVNC and TightVNC servers.
* Added support for [SetDesktopSize].
* Added SSH tunneling example using libssh2.
* Added some extensions to VeNCrypt in order to be compatible with a wider range of servers.
[#]# LibVNCServer:
* Fixes to the multi-threaded server implementation which should be a lot more sound now.
* Fixed TightVNC-filetransfer file upload for 64-bit systems.
* Fixes of crashes in the zlib compression.
* Added support for [UTF8 clipboard data].
* Fixed visual artifacts in framebuffer on ARM platforms.
* Fixed several WebSockets bugs.
* Fixed the UltraVNC-style repeater example.
* Added support for larger framebuffers (two 4k screens possible now).
* Added support for timeouts for outbound connections (to repeaters for instance).
* Fixed out-of-bounds memory access in Tight encoding.
- modified patches
% 0001-libvncserver-Add-API-to-add-custom-I-O-entry-points.patch (refreshed)
% 0002-libvncserver-Add-channel-security-handlers.patch (refreshed)
- deleted patches
- 0001-libvncserver-don-t-NULL-out-internal-of-the-default-.patch (upstreamed)
- 0003-libvncserver-auth-don-t-keep-security-handlers-from-.patch (upstreamed)
- 0004-zlib-Clear-buffer-pointers-on-cleanup-444.patch (upstreamed)
- LibVNCServer-CVE-2020-29260.patch (upstreamed)
* Thu Sep 08 2022 pgajdos@suse.com
- security update
- added patches
fix CVE-2020-29260 [bsc#1203106], memory leakage via rfbClientCleanup()
+ LibVNCServer-CVE-2020-29260.patch
* Fri Sep 17 2021 pgajdos@suse.com
- purposedly adding just this changelog entry
- previous version updates fixed also:
* CVE-2020-14398 [bsc#1173880] -- improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
* CVE-2017-18922 [bsc#1173477] -- preauth buffer overwrite
* CVE-2018-20748 [bsc#1123823] -- libvnc contains multiple heap out-of-bounds writes
* CVE-2020-25708 [bsc#1178682] -- libvncserver/rfbserver.c has a divide by zero which could result in DoS
* CVE-2018-21247 [bsc#1173874] -- uninitialized memory contents are vulnerable to Information leak
* CVE-2018-20750 [bsc#1123832] -- heap out-of-bounds write vulnerability in libvncserver/rfbserver.c
* CVE-2020-14397 [bsc#1173700] -- NULL pointer dereference in libvncserver/rfbregion.c
* CVE-2019-20839 [bsc#1173875] -- buffer overflow in ConnectClientToUnixSock()
* CVE-2020-14401 [bsc#1173694] -- potential integer overflows in libvncserver/scale.c
* CVE-2020-14400 [bsc#1173691] -- Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
* CVE-2019-20840 [bsc#1173876] -- unaligned accesses in hybiReadAndDecode can lead to denial of service
* CVE-2020-14399 [bsc#1173743] -- Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
* CVE-2020-14402 [bsc#1173701] -- out-of-bounds access via encodings.
* CVE-2020-14403 [bsc#1173701]
* CVE-2020-14404 [bsc#1173701]
* Fri Jan 08 2021 Frederic Crozat <fcrozat@suse.com>
- Add many patches needed for GNOME Remote desktop (already in
Fedora):
* TLS security type enablement patches gh#LibVNC/libvncserver!234
- 0001-libvncserver-Add-API-to-add-custom-I-O-entry-points.patch
- 0002-libvncserver-Add-channel-security-handlers.patch
- 0003-libvncserver-auth-don-t-keep-security-handlers-from-.patch
* Fix crash on all runs after the first gh#LibVNC/libvncserver!444 rh#1882718
- 0004-zlib-Clear-buffer-pointers-on-cleanup-444.patch
* Fix another crasher glgo#GNOME/gnome-remote-desktop#45 rh#1882718
- 0001-libvncserver-don-t-NULL-out-internal-of-the-default-.patch
* Tue Jun 30 2020 pgajdos@suse.com
- version update to 0.9.13 [bsc#1173477]
[#]# Overall changes:
* Small tweaks to the CMake build system.
* The macOS server example was overhauled and is now the most feature-complete sample
application of the project, ready for real-world use.
* Lots of documentation updates and markdownifying.
* The TravisCI continuous integration now also build-checks cross-compilation from
Linux to Windows.
* Setup a [Gitter community chat](https://gitter.im/LibVNC/libvncserver) for the project.
[#]# LibVNCServer/LibVNCClient:
* Both LibVNCServer and LibVNCClient now support an additional platform, namely
Microsoft Windows. Building is supported with Visual Studio as well as MingGW.
* The separate crypto routines used by LibVNCClient and LibVNCServer were refactored
into an implementation common to both libraries.
* Several security issues got fixed.
* The bundled noVNC client is now at version 1.1.0 and included via a git submodule.
[#]# LibVNCClient:
* Added connect timeout as well as read timeout support thanks to Tobias Junghans.
* Both TLS backends now do proper locking of network operations when multi-threaded
thanks to Gaurav Ujjwal.
* Fixed regression in Tight/Raw decoding introduced in 0.9.12 thanks to DRC.
* Fixed encrypted connections to AnonTLS servers when using the OpenSSL back-end.
Made possible by the profound research done by Gaurav Ujjwal.
[#]# LibVNCServer:
* Added a hooking function (`clientFramebufferUpdateRequestHook`) to deliver
rfbFramebufferUpdateRequest messages from clients to the frame producer
thanks to Jae Hyun Yoo.
* Added SetDesktopSize/ExtendedDesktopSize support thanks to Floris Bos.
* Added multi-threading support for MS Windows.
* Fixed VNC repeater/proxy functionality that was broken in 0.9.12.
* Fixed unstable WebSockets connections thanks to Sebastian Kranz.
- deleted patches
- LibVNCServer-CVE-2019-15681.patch (upstreamed)
- LibVNCServer-CVE-2019-15690.patch (upstreamed)
- LibVNCServer-CVE-2019-20788.patch (upstreamed)
- avoid-pthread_join-if-backgroundLoop-is-FALSE.patch (upstreamed)
- cmake-libdir.patch (upstreamed)
- fix-crash-on-shutdown.patch (upstreamed)
* Mon May 04 2020 pgajdos@suse.com
- deleted patches
- LibVNCServer-CVE-2018-20749.patch (mistakenly added, it is
already part of 0.9.12)
* Mon Apr 27 2020 pgajdos@suse.com
- security update
- added patches
fix CVE-2019-15690 [bsc#1160471], heap buffer overflow
+ LibVNCServer-CVE-2019-15690.patch
fix CVE-2019-20788 [bsc#1170441], integer overflow and heap-based buffer overflow via a large height or width value
+ LibVNCServer-CVE-2019-20788.patch
* Fri Jan 10 2020 Fabian Vogt <fvogt@suse.com>
- Add patches to fix crash on shutdown:
* avoid-pthread_join-if-backgroundLoop-is-FALSE.patch
* fix-crash-on-shutdown.patch
* Mon Nov 04 2019 pgajdos@suse.com
- turn the test suite on
/usr/include/rfb /usr/include/rfb/keysym.h /usr/include/rfb/rfb.h /usr/include/rfb/rfbclient.h /usr/include/rfb/rfbconfig.h /usr/include/rfb/rfbproto.h /usr/include/rfb/rfbregion.h /usr/include/rfb/threading.h /usr/lib64/cmake/LibVNCServer /usr/lib64/cmake/LibVNCServer/LibVNCServerConfig.cmake /usr/lib64/cmake/LibVNCServer/LibVNCServerConfigVersion.cmake /usr/lib64/cmake/LibVNCServer/LibVNCServerTargets-relwithdebinfo.cmake /usr/lib64/cmake/LibVNCServer/LibVNCServerTargets.cmake /usr/lib64/libvncclient.so /usr/lib64/libvncserver.so /usr/lib64/pkgconfig/libvncclient.pc /usr/lib64/pkgconfig/libvncserver.pc /usr/share/doc/packages/LibVNCServer-devel /usr/share/doc/packages/LibVNCServer-devel/AUTHORS /usr/share/doc/packages/LibVNCServer-devel/ChangeLog /usr/share/doc/packages/LibVNCServer-devel/NEWS.md /usr/share/doc/packages/LibVNCServer-devel/README.md /usr/share/licenses/LibVNCServer-devel /usr/share/licenses/LibVNCServer-devel/COPYING
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Oct 8 23:32:53 2025