libvncserver1-0.9.13-150400.3.3.1<>,A c p9|4yLpn'{ {"3JV7JB@F(iNDǀaޘA./-"B+x;$p,_)!Me5b\I=Oܵ}ؕF .6"'1<{ns|ɚvVff RH UJyu4 ":?m#pI.[̦N9\ArEGh eo,?pT&n]y`~1h-Lսa lWVűC.ю@>@8L?8<d $ F+ ARy     (l(68@9:>3@4F4G4(H4<I4PX4XY4d\4]4^4b59c5d6ie6nf6ql6su6v6w7px7y7z777788Clibvncserver10.9.13150400.3.3.1Library implementing a VNC serverLibVNCServer/LibVNCClient are cross-platform C libraries that allow implementing VNC server or client functionality in your program.c ibs-arm-3y SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/System/Librarieshttps://github.com/LibVNC/libvncserverlinuxaarch64 F{&A큤ccc^^89103d9ffe84a1f17ae856e50b5d375aacc675c98aed8768d96136b70453edad4d23c8c814e5baf007d854f01d8502e77dc56a41144934e003fb32c4e052d20ff97d6caa18efbefb491bfb910dfce6ef0aa145d3519fcfc85853daa66e2f1471libvncserver.so.0.9.13rootrootrootrootrootrootrootrootrootrootLibVNCServer-0.9.13-150400.3.3.1.src.rpmlibvncserver.so.1()(64bit)libvncserver1libvncserver1(aarch-64)@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libgcrypt.so.20()(64bit)libgcrypt.so.20(GCRYPT_1.6)(64bit)libgnutls.so.30()(64bit)libgnutls.so.30(GNUTLS_3_4)(64bit)libjpeg.so.8()(64bit)libjpeg.so.8(LIBJPEG_8.0)(64bit)liblzo2.so.2()(64bit)libpng16.so.16()(64bit)libpng16.so.16(PNG16_0)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3c@aD@_I@^)@^^@^g@]]\mA@\ac\ac\Yz\8@\-@\-@ZWDB@TOTOT*@pgajdos@suse.compgajdos@suse.comfcrozat@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comfvogt@suse.compgajdos@suse.compgajdos@suse.comfezhang@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comadam.majer@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.comantoine.belvire@laposte.netcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgp.drouand@gmail.com- security update - added patches fix CVE-2020-29260 [bsc#1203106], memory leakage via rfbClientCleanup() + LibVNCServer-CVE-2020-29260.patch- purposedly adding just this changelog entry - previous version updates fixed also: * CVE-2020-14398 [bsc#1173880] -- improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c * CVE-2017-18922 [bsc#1173477] -- preauth buffer overwrite * CVE-2018-20748 [bsc#1123823] -- libvnc contains multiple heap out-of-bounds writes * CVE-2020-25708 [bsc#1178682] -- libvncserver/rfbserver.c has a divide by zero which could result in DoS * CVE-2018-21247 [bsc#1173874] -- uninitialized memory contents are vulnerable to Information leak * CVE-2018-20750 [bsc#1123832] -- heap out-of-bounds write vulnerability in libvncserver/rfbserver.c * CVE-2020-14397 [bsc#1173700] -- NULL pointer dereference in libvncserver/rfbregion.c * CVE-2019-20839 [bsc#1173875] -- buffer overflow in ConnectClientToUnixSock() * CVE-2020-14401 [bsc#1173694] -- potential integer overflows in libvncserver/scale.c * CVE-2020-14400 [bsc#1173691] -- Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. * CVE-2019-20840 [bsc#1173876] -- unaligned accesses in hybiReadAndDecode can lead to denial of service * CVE-2020-14399 [bsc#1173743] -- Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. * CVE-2020-14402 [bsc#1173701] -- out-of-bounds access via encodings. * CVE-2020-14403 [bsc#1173701] * CVE-2020-14404 [bsc#1173701]- Add many patches needed for GNOME Remote desktop (already in Fedora): * TLS security type enablement patches gh#LibVNC/libvncserver!234 - 0001-libvncserver-Add-API-to-add-custom-I-O-entry-points.patch - 0002-libvncserver-Add-channel-security-handlers.patch - 0003-libvncserver-auth-don-t-keep-security-handlers-from-.patch * Fix crash on all runs after the first gh#LibVNC/libvncserver!444 rh#1882718 - 0004-zlib-Clear-buffer-pointers-on-cleanup-444.patch * Fix another crasher glgo#GNOME/gnome-remote-desktop#45 rh#1882718 - 0001-libvncserver-don-t-NULL-out-internal-of-the-default-.patch- version update to 0.9.13 [bsc#1173477] [#]# Overall changes: * Small tweaks to the CMake build system. * The macOS server example was overhauled and is now the most feature-complete sample application of the project, ready for real-world use. * Lots of documentation updates and markdownifying. * The TravisCI continuous integration now also build-checks cross-compilation from Linux to Windows. * Setup a [Gitter community chat](https://gitter.im/LibVNC/libvncserver) for the project. [#]# LibVNCServer/LibVNCClient: * Both LibVNCServer and LibVNCClient now support an additional platform, namely Microsoft Windows. Building is supported with Visual Studio as well as MingGW. * The separate crypto routines used by LibVNCClient and LibVNCServer were refactored into an implementation common to both libraries. * Several security issues got fixed. * The bundled noVNC client is now at version 1.1.0 and included via a git submodule. [#]# LibVNCClient: * Added connect timeout as well as read timeout support thanks to Tobias Junghans. * Both TLS backends now do proper locking of network operations when multi-threaded thanks to Gaurav Ujjwal. * Fixed regression in Tight/Raw decoding introduced in 0.9.12 thanks to DRC. * Fixed encrypted connections to AnonTLS servers when using the OpenSSL back-end. Made possible by the profound research done by Gaurav Ujjwal. [#]# LibVNCServer: * Added a hooking function (`clientFramebufferUpdateRequestHook`) to deliver rfbFramebufferUpdateRequest messages from clients to the frame producer thanks to Jae Hyun Yoo. * Added SetDesktopSize/ExtendedDesktopSize support thanks to Floris Bos. * Added multi-threading support for MS Windows. * Fixed VNC repeater/proxy functionality that was broken in 0.9.12. * Fixed unstable WebSockets connections thanks to Sebastian Kranz. - deleted patches - LibVNCServer-CVE-2019-15681.patch (upstreamed) - LibVNCServer-CVE-2019-15690.patch (upstreamed) - LibVNCServer-CVE-2019-20788.patch (upstreamed) - avoid-pthread_join-if-backgroundLoop-is-FALSE.patch (upstreamed) - cmake-libdir.patch (upstreamed) - fix-crash-on-shutdown.patch (upstreamed)- deleted patches - LibVNCServer-CVE-2018-20749.patch (mistakenly added, it is already part of 0.9.12)- security update - added patches fix CVE-2019-15690 [bsc#1160471], heap buffer overflow + LibVNCServer-CVE-2019-15690.patch fix CVE-2019-20788 [bsc#1170441], integer overflow and heap-based buffer overflow via a large height or width value + LibVNCServer-CVE-2019-20788.patch- Add patches to fix crash on shutdown: * avoid-pthread_join-if-backgroundLoop-is-FALSE.patch * fix-crash-on-shutdown.patch- turn the test suite on- security update - added patches CVE-2019-15681 [bsc#1155419] + LibVNCServer-CVE-2019-15681.patch- Add BuildRequire libgnutls-devel: Remmina needs it for VNC connections (boo#1123805)- use upstream commit, amend cmake-libdir.patch- fix cmake build, add cmake-libdir.patch (upstream issue #281)- update to version 0.9.12 - Overall changes: * CMake now is the default build system, Autotools were removed. * In addition to TravisCI, all commits are now build-tested by AppVeyorCI. - LibVNCServer/LibVNCClient: * Numerous build fixes for Visual Studio compilers to the extent that one can now _build_ the project with these. The needed changes for successfully _running_ stuff will be implemented in 0.9.13. * Fixed building for Android and added build instructions. * Removed the unused PolarSSL wrapper. * Updated the bundled noVNC to latest release 1.0.0. * Allowed to use global LZO library instead of miniLZO. - LibVNCClient: * Support for OpenSSL 1.1.x. * Support for overriding the default rectangle decode handlers (with hardware-accelerated ones for instance) thanks to Balazs Ludmany. * vnc2mpg updated. * Added support for X509 server certificate verification as part of the handshake process thanks to Simon Waterman. * Added a TRLE decoder thanks to Wiki Wang. * Included Tight decoding optimizations from TurboVNC thanks to DRC. * Ported the SDL viewer from SDL 1.2 to SDL 2.0. * Numerous security fixes. * Added support for custom auth handlers in order to support additional security types. - LibVNCServer: * Websockets rework to remove obsolete code thanks to Andreas Weigel. * Ensured compatibility with gtk-vnc 0.7.0+ thanks to Michał Kępień. * The built-in webserver now sends correct MIME type for Javascript. * Numerous memory management issues fixed. * Made the TightVNC-style file transfer more stable. - removed patches - LibVNCServer-CVE-2018-20021.patch (upstreamed) - LibVNCServer-CVE-2018-20023.patch (upstreamed) - libvncserver-0.9.10-ossl.patch (not upstreamed) - LibVNCServer-CVE-2018-15127.patch (upstreamed) - LibVNCServer-CVE-2018-6307.patch (upstreamed) - LibVNCServer-CVE-2018-20019.patch (upstreamed) - LibVNCServer-CVE-2018-7225.patch (upstreamed) - LibVNCServer-CVE-2018-20022.patch (upstreamed) - libvncserver-0.9.1-multilib.patch (cmake now) - LibVNCServer-CVE-2018-15126.patch (upstreamed) - LibVNCServer-CVE-2018-20020.patch (upstreamed) - LibVNCServer-CVE-2018-20024.patch (upstreamed) - removed by upstream - libvncserver-config - security update * CVE-2018-20749 [bsc#1123828] + LibVNCServer-CVE-2018-20749.patch- Fix devel package dependencies- security update * CVE-2018-15126 [bsc#1120114] + LibVNCServer-CVE-2018-15126.patch * CVE-2018-6307 [bsc#1120115] + LibVNCServer-CVE-2018-6307.patch * CVE-2018-20020 [bsc#1120116] + LibVNCServer-CVE-2018-20020.patch * CVE-2018-15127 [bsc#1120117] + LibVNCServer-CVE-2018-15127.patch * CVE-2018-20019 [bsc#1120118] + LibVNCServer-CVE-2018-20019.patch * CVE-2018-20023 [bsc#1120119] + LibVNCServer-CVE-2018-20023.patch * CVE-2018-20022 [bsc#1120120] + LibVNCServer-CVE-2018-20022.patch * CVE-2018-20024 [bsc#1120121] + LibVNCServer-CVE-2018-20024.patch * CVE-2018-20021 [bsc#1120122] + LibVNCServer-CVE-2018-20021.patch- Update to version 0.9.11 Overall changes: LibVNCServer/LibVNCClient development now uses continous intregration, provided by TravisCI. LibVNCClient: Now initializes libgcrypt before use if the application did not do it. Fixes a crash when connection to Mac hosts (#45). Various fixes that result in more stable handling of malicious or broken servers. Removed broken and unmaintained H264 decoding. Some documentation fixes. Added hooks to WriteToTLS() for optional protection by mutex. LibVNCServer: Stability fixes for the WebSocket implementation. Replaced SHA1 implementation with the one from RFC 6234. The built-in HTTP server does not allow directory traversals anymore. The built-in HTTP now sends correct MIME types for CSS and SVG. Added support for systemd socket activation. Made it possible to get autoPort behavior with either ipv4 or ipv6 disabled. Fixed starting of an onHold-client in threaded mode. - dropped patches: - libvncserver-0.9.10-use-namespaced-rfbMax-macro.patch (upstreamed) - libvncserver-byteswap.patch (stop maintaining not upstreamed patch) - modified patches: % libvncserver-0.9.10-ossl.patch (refreshed)- security update * CVE-2018-7225 [bsc#1081493] + LibVNCServer-CVE-2018-7225.patch- Fix build errors of applications using stl_algobase.h and libvncserver's rfbproto.h, e.g. krfb (issue #102) * Add libvncserver-0.9.10-use-namespaced-rfbMax-macro.patch- Remove xorg-x11-devel from buildRequires, X libraries are not directly used/linked- libvncserver-0.9.10-ossl.patch: Update, do not RAND_load_file("/dev/urandom", 1024) if the the PRNG is already seeded. (It always is on linux)- Update to version 0.9.10 + Moved the whole project from sourceforge to https://libvnc.github.io/. + Cleaned out the autotools build system which now uses autoreconf. + Updated noVNC HTML5 client to latest version. + Split out x11vnc sources into separate repository at https://github.com/LibVNC/x11vnc + Split out vncterm sources into separate repository at https://github.com/LibVNC/vncterm + Split out VisualNaCro sources into separate repository at https://github.com/LibVNC/VisualNaCro + Merged Debian patches. + Fixed some security-related buffer overflow cases. + Added compatibility headers to make LibVNCServer/LibVNCClient build on native Windows 8. + Update LZO to version 2.07, fixing CVE-2014-4607. + Merged patches from KDE/krfb. + Can now do IPv6 without IPv4. + Fixed a use-after-free issue in scale.c. - Update Url and download source to new project home - Remove LibVNCServer-0.9.9-no_x11vnc.patch; upstream splited it out of main tarball - Rebase libvncserver-ossl.patch to upstream changes > libvncserver-0.9.10-ossl.patch - Remove linuxvnc subpackage; like x11vnc, it has been splited out but is depreciated and unmaintained./sbin/ldconfig/sbin/ldconfigibs-arm-3 16626424410.9.13-150400.3.3.10.9.13-150400.3.3.1libvncserver.so.0.9.13libvncserver.so.1libvncserver1COPYINGREADME.md/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libvncserver1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:25843/SUSE_SLE-15-SP4_Update/c1d0c800ed33f7aa673432202deceaea-LibVNCServer.SUSE_SLE-15-SP4_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=f4fcbc5c99f7cd33c50efcbe2b85040b6297b0a8, strippeddirectoryASCII textUTF-8 Unicode text, with very long linesPRRRR RRR RRR R R RRRR[+"w,\0Loutf-8d845e9ef37f0da061d97f0fe30770d939fe5d14bda5b0d21231a6b4e9669b02a?7zXZ !t/MU]"k%AKE_h,@@ة/oӱ{!V#fO-F0~]ks*|6gKua3$ פ| vx}iz-9Dh ;N7h>nr8 ۢwuäR5U"bxEy|8‰,DM $WE}(߮d@R:D|Y8ɴkBĻsTj:VcWε*l14u!D iGO),WQuC+!.X.އQVjBju3{I\, ,7ohI {Jolj0/qoب.4& '0Mv!{_iĦZ3x7񹁱* W$,M="݊^hC0 S<&c/bM"P))/CRa>t!e t|xk:4h *T YZ