Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libwinpr2-2 | Distribution: SUSE Linux Enterprise 15 |
Version: 2.11.2 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150600.2.1 | Build date: Fri May 10 13:21:37 2024 |
Group: Productivity/Networking/Other | Build host: s390zl32 |
Size: 1331022 | Source RPM: freerdp-2.11.2-150600.2.1.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://www.freerdp.com/ | |
Summary: Windows Portable Runtime |
WinPR provides API compatibility for applications targeting non-Windows environments. When on Windows, the original native API is being used instead of the equivalent WinPR implementation, without having to modify the code using it.
Apache-2.0
* Thu May 09 2024 yu.daike@suse.com - Add freerdp-CVE-2024-32039-to-2024-32460.patch + Multiple CVE fixes * bsc#1223293, CVE-2024-32039 * bsc#1223294, CVE-2024-32040 * bsc#1223295, CVE-2024-32041 * bsc#1223296, CVE-2024-32458 * bsc#1223297, CVE-2024-32459 * bsc#1223298, CVE-2024-32460 * Tue Feb 06 2024 yu.daike@suse.com - Add freerdp-CVE-2023-40574-to-2023-40576.patch * Fix CVE-2023-40574 - bsc#1214869 Out-Of-Bounds Write in general_YUV444ToRGB_8u_P3AC4R_BGRX * Fix CVE-2023-40575 - bsc#1214870 Out-Of-Bounds Read in general_YUV444ToRGB_8u_P3AC4R_BGRX * Fix CVE-2023-40576 - bsc#1214871 Out-Of-Bounds Read in RleDecompress * Thu Nov 16 2023 christophe@krop.fr - Fix winpr-devel dependencies. WinePRTargets-*.cmake defines CMake targets for winpr-hash and winpr-makecert. They have to be present. * Fri Oct 20 2023 dlshcbmuipmam@hotmail.com - Update to 2.11.2 * Backported #9356: Fix issues with order updates * Backported #9378: backported wArrayList (optional) copy on insert * Backported #9360: backported certificate algorithm detection * Wed Aug 30 2023 christophe@krop.fr - Update to 2.11.0 * Various input validation fixes * Added various CMake options #9317 * LibreSSL build fixes #8709 * Big endian support * Mouse grabbing support * wayland scrolling fix * Update h264 to use new FFMPEG API * early bail from update_read_window_state_order breaks protocol * rdpecam/server: Remove wrong assertion * bounds checks for gdi/gfx rectangles * enforce rdpdr client side state checks * deactivate mouse grabbing by default * channels/cliprdr: Fix writing incorrect PDU type for unlock PDUs * Fix CVE-2023-39350 - boo#1214856 incorrect offset calculation leading to DoS * Fix CVE-2023-39351 - boo#1214857 Null Pointer Dereference leading DoS in RemoteFX * Fix CVE-2023-39352 - boo#1214858 Invalid offset validation leading to Out Of Bound Write * Fix CVE-2023-39353 - boo#1214859 Missing offset validation leading to Out Of Bound Read * Fix CVE-2023-39354 - boo#1214860 Out-Of-Bounds Read in nsc_rle_decompress_data * Fix CVE-2023-39356 - boo#1214862 Missing offset validation leading to Out-of-Bounds Read in gdi_multi_opaque_rect * Fix CVE-2023-40181 - boo#1214863 Integer-Underflow leading to Out-Of-Bound Read in zgfx_decompress_segment * Fix CVE-2023-40186 - boo#1214864 IntegerOverflow leading to Out-Of-Bound Write Vulnerability in gdi_CreateSurface * Fix CVE-2023-40188 - boo#1214866 Out-Of-Bounds Read in general_LumaToYUV444 * Fix CVE-2023-40567 - boo#1214867 Out-Of-Bounds Write in clear_decompress_bands_data * Fix CVE-2023-40569 - boo#1214868 Out-Of-Bounds Write in progressive_decompress * Fix CVE-2023-40589 - boo#1214872 Global-Buffer-Overflow in ncrush_decompress - Drop patch, now upstream: * Update_h264_to_use_new_FFMPEG_API.patch * Wed May 31 2023 schwab@suse.de - Don't compile shared objects with -fPIE and use -pie only for executables - Reenable LTO on ARM * Mon Apr 24 2023 bjorn.lie@gmail.com - Add Update_h264_to_use_new_FFMPEG_API.patch: Update h264 to use new FFMPEG API. * Thu Feb 16 2023 hpj@urpla.net - Ugraded to freerdp 2.10.0 * Fix android build scripts, use CMake from SDK * Fix connection negotiation with mstsc/msrdc #8426 * [ntlm]: use rfc5929 binding hash algorithm #8430 * [channels,printer] Fixed reference counting #8433 * Fix uwac pixman #8439 * Fix Rdp security #8457 * [client,x11] Detect key autorepeat #8522 * [build] add channel path to RPATH #8551 * Fix build with BUILTIN_CHANNELS=OFF #8560 * revert changes so that the osmajortype/osminortype is not overwritten #8571 * [uwac] do not use iso C functions #8604 * [winpr,sam] fix inalid NULL arguments #8605 * Fix incompatible function pointer types #8625 * Fixed issues: * Backported #8581: Ignore data PDUs for DVCs that were not opened successfully * Backported #8498: [channel,urbdrc] fix type of usb hotplug callback * Backported #8537: Extended info enforce limits * Backported #8611: [core] add missing redirection fields - Patches removed, that were accepted upstream + freerdp-builtin-channels-off-link-fix.diff + freerdp-fix-rpath-settings.diff * Fri Dec 16 2022 hpj@urpla.net - Complement fix for -DBUILTIN_CHANNELS=OFF to fix freerdp-proxy accessing librdpgfx-client.so: freerdp-fix-rpath-settings.diff Fixes second part of bnc#1205595. * Sun Dec 11 2022 kv@kott.no-ip.biz - Disable VAAPI feature due bug https://bugzilla.opensuse.org/show_bug.cgi?id=1205595 * Thu Nov 17 2022 jweberhofer@weberhofer.at - Ugraded to freerdp 2.9.0 * Backported #gh:FreeRDP/FreeRDP#8252: Support sending server redirection PDU * Backported #gh:FreeRDP/FreeRDP#8406: Ensure X11 client cursor is never smaller 1x1 * Backported #gh:FreeRDP/FreeRDP#8403: Fixed multiple client side input validation issues - boo#1205512, boo#1205563, boo#1205564 (CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319, CVE-2022-39320, CVE-2022-41877, CVE-2022-39347) * Backported #7282: Proxy server now discards input events sent before activation was received * Backported #gh:FreeRDP/FreeRDP#8324: Internal replacements for md4, md5 and hmac-md5 For the time being the RDP protocol requires these outdated hash algorithms. So any distribution that wants to ship a working FreeRDP should check the options WITH_INTERNAL_MD4 (and depending on OpenSSL deprecation status WITH_INTERNAL_MD5) - Fixed issues: * Backported #gh:FreeRDP/FreeRDP#8341: Null checks in winpr_Digest_Free * Backported #gh:FreeRDP/FreeRDP#8335: Missing NULL return in winpr_Digest_New * Backported #gh:FreeRDP/FreeRDP#8192: Support for audin version 2 microphone channel * Backported #gh:FreeRDP/FreeRDP#7282: Discard input events before activation (Fixes #8374) * Mon Nov 07 2022 jweberhofer@weberhofer.at - Ugraded to freerdp 2.8.1 * Fixed CVE-2022-39282 - boo#1204258 using the `/parallel` command line switch might read uninitialized data * Fixed CVE-2022-39283 - boo#1204257 using the `/video` command line switch might read uninitialized data * Added missing commit for backported #gh:FreeRDP/FreeRDP#8041: Remove ALAW/ULAW codecs from linux backends (unreliable) * Added hash checks for android build script dependencies - Fixed issues: * #gh:FreeRDP/FreeRDP#8190: Fix build break with newer FFMPEG versions * #gh:FreeRDP/FreeRDP#8234: Updated flatpak with build script * #gh:FreeRDP/FreeRDP#8210: Better execinfo support check for android * #gh:FreeRDP/FreeRDP#7708: Header now defines DumpThreadHandles * #gh:FreeRDP/FreeRDP#8176: Check fullscreen state and not setting * #gh:FreeRDP/FreeRDP#8236: Send resize on window state change * #gh:FreeRDP/FreeRDP#7611: Audin macOS monterey fix * #gh:FreeRDP/FreeRDP#8291: Android build script update * Fix length checks and initialization in the deprecated (disabled per default) tsmf channel * Mon Aug 08 2022 bjorn.lie@gmail.com - Ugraded to freerdp 2.8.0 * Backported API to get peer accepted channel option flags * Backported API to get peer accepted channel names * Backported Stream_CheckAndLogRequiredLength * Backported #7954: Add server side handling for [MS-RDPET] * Backported #8010: Add server side handling for [MS-RDPECAM] * Backported #8041: Remove ALAW/ULAW codecs from linux backends (unreliable) * Backported #8051: Relieve CLIPRDR filename restriction when connecting to non-MS Windows servers * Backported #8048: TLS version control * Backported #7987: Add a new command line arg to enforce tls1.2 - Fixed issues: * Fixed #7837: Prevent out of bound reads for FFMPEG * Backported #7859 and #7861: Unwind support for backtrace generation * Backported #7440: wlfreerdp appid * Backported #7832: RAIL window restore * Backported #7833: Refactored WinPR thread locking * Backported #7893: Mac rdpsnd memory leak fixes * Backported #7895: Mac audin memory leak fixes * Backported #7898: Automatic android versioning * Backported #7916: GFX 10.7 capability support * Backported #7949: Server RDPSND API improvements * Backported #7957: Server DVC API improvements * Backported #7760: Fixed osMinorType values * Backported #8013: Add missing osMajorType values * Backported #8076: Fix wrong usage of subband diffing flag (tile artifact fix) * Tue Apr 26 2022 jweberhofer@weberhofer.at - Upgraded to freerdp 2.7.0 * OpenSSL3 gateway support (#gh:FreeRDP/FreeRDP#7822) * various NTLM fixes * WINPR_ASSERT to ease future backports * Fixed CVE-2022-24882 - boo#1198919 NTLM not properly check parameters * Fixed CVE-2022-24883 - boo#1198921 Fix authentication against invalid SAM files - Fixed issues: * #gh:FreeRDP/FreeRDP#6786: Use /network:auto by default * #gh:FreeRDP/FreeRDP#7714: Workaround for broken surface frame marker * #gh:FreeRDP/FreeRDP#7733: Support 10bit X11 color (BGRX32 only) * #gh:FreeRDP/FreeRDP#7745: GFX progressive double free * #gh:FreeRDP/FreeRDP#7808: Disable websockets with /gt:rpc * #gh:FreeRDP/FreeRDP#7815: RAIL expect LOGON_MSG_SESSION_CONTINUE * Tue Mar 08 2022 jweberhofer@weberhofer.at - Upgraded to freerdp 2.6.1 * Decreased logging verbosity, now freerdp is much less verbose by default * Backported freerdp_abort_connect during freerdp_connect fix (#gh:FreeRDP/FreeRDP#7700) * Backported improved version dection see docs/version_detection.md for details * Backported various rdpsnd fixes (#gh:FreeRDP/FreeRDP#7695) * Wed Feb 23 2022 jweberhofer@weberhofer.at - Upgraded to freerdp 2.6.0 * Backported android FFMPEG build scripts * Updated android build dependencies * Backported AINPUT channel Fixed issues: * Backported #gh:FreeRDP/FreeRDP#7303: Fix PDU length for RDPINPUT_PROTOCOL_V300 * Backported #gh:FreeRDP/FreeRDP#7658: Sanitize optional physical monitor size values * Backported #gh:FreeRDP/FreeRDP#7426: Wayland memory corruption * Backported #gh:FreeRDP/FreeRDP#7293: Remove unused codec x264 * Backported #gh:FreeRDP/FreeRDP#7541: Allow resolutions larger 2048x2048 * Backported #gh:FreeRDP/FreeRDP#7574: FFMPEG 5.0 support * Backported #gh:FreeRDP/FreeRDP#7578: FFMPEG 5.0 support * Backported #gh:FreeRDP/FreeRDP#7580: Fixed device hotplugging * Backported #gh:FreeRDP/FreeRDP#7583: GetUserNameExA: Prefer getpwuid_r over getlogin_r over getlogin * Backported #gh:FreeRDP/FreeRDP#7585: Android Mediacodec support * Mon Jan 24 2022 predivan@mts.rs - Enable FFmpeg support for Leap-15.2+ * Thu Jan 13 2022 jweberhofer@weberhofer.at - Upgraded to freerdp 2.5.0 * Fixed smartcard login in case a redirection occurs the pin was lost * Backported windows client drawing fixes * Backported improved macOS keyboard layout detection * Backported TcpConnectTimeout * Backported LibreSSL compatibility patches * Backported signal handler backtrace * Backported OpenSSL 3.0 support * Backport #gh:FreeRDP/FreeRDP#7539: Wayland client clipboard issues * Backport #gh:FreeRDP/FreeRDP#7509: Various fixes regarding registry emulation, addin loader and updated locale detection * Backport #gh:FreeRDP/FreeRDP#7466: Android android_register_pointer missing initialization * Thu Dec 02 2021 fvogt@suse.com - Add patch to fix connecting without H.264-enabled FFmpeg (boo#1190823): * 0001-Make-H.264-codec-optional-during-runtime.patch - Use %autosetup * Thu Oct 21 2021 jweberhofer@weberhofer.at - Upgraded to freerdp 2.4.1 Important security issues, boo#1191895: * CVE-2021-41159: Improper client input validation for gateway connections allows to overwrite memory * CVE-2021-41160: Improper region checks in all clients allow out of bound write to memory Noteworthy changes: * Refactored RPC gateway parsing code * OpenSSL 3.0 compatibility fixes * USB redirection: fixed transfer lengths Fixed issues: * #gh:FreeRDP/FreeRDP#7363: Length checks in ConvertUTF8toUTF16 * #gh:FreeRDP/FreeRDP#7349: Added checks for bitmap width and heigth values - Force library update to the latest, renamed versions (followup to boo#1191755) * Wed Oct 20 2021 jweberhofer@weberhofer.at - Renamed libraries to follow packaging standards as requested in boo#1191755 * Thu Oct 07 2021 hpj@urpla.net - Finally nailed it: CMAKE_INSTALL_LIBDIR is absolute on Leaps and relative on TW, but freerdp requires the relative variant. Fixes boo#1190919 * Wed Oct 06 2021 hpj@urpla.net - Remove freerdp-fix-plugin-path.patch again, the problem was introduced/fixed by cmake changes * Sat Sep 18 2021 hpj@urpla.net - Create an explicit freerdp dependency for libwinpr * Fri Sep 17 2021 hpj@urpla.net - Add preliminary patch freerdp-fix-plugin-path.patch to fix dynamic addin loading * Fri Sep 17 2021 jweberhofer@weberhofer.at - Modified spec to satisfy because obs-service-source_validator does not support elif * Wed Sep 15 2021 hpj@urpla.net - Fix the spec-cleaner mess - Enable a few options on TW - Build for 15.3 required another lib - Remove X264 option, no related backend exists and enabling it fails in cmake creation stage * Fri Aug 20 2021 hpj@urpla.net - Reorganize build flags - Apply fix for -DBUILTIN_CHANNELS=OFF: freerdp-builtin-channels-off-link-fix.diff - Add plugins to libwinpr * Wed Aug 11 2021 jweberhofer@weberhofer.at - Updated to release 2.4.0 Noteworthy changes: * Backported multithreaded progressive decoder (#7036) * Backported clipboard fixes (#6924) * Fixed remote file read (#7185) Fixed issues: * #gh:FreeRDP/FreeRDP#6938: RAILS clipboard remote -> local * #gh:FreeRDP/FreeRDP#6985: Support newer FFMPEG builds * #gh:FreeRDP/FreeRDP#6989: Use OpenSSL default certificate store settings * #gh:FreeRDP/FreeRDP#7073: Planar alignment fixes * Mon Mar 15 2021 jweberhofer@weberhofer.at - Updated to release 2.3.2 Noteworthy changes: * Fixed autoreconnect printer backend loading * Fixed compilation on older mac os versions < 10.14 * Fixed mouse pointer move with smart-sizing * Added command line option to disable websocket gateway support * Fixed drive hotplugging issues with windows * Fixed smartcard issues on mac Fixed issues: * #gh:FreeRDP/FreeRDP#6900: Transparency issues with aFreeRDP * #gh:FreeRDP/FreeRDP#6848: Invalid format string in smartcard trace * #gh:FreeRDP/FreeRDP#6846: Fixed static builds * #gh:FreeRDP/FreeRDP#6888: Crash due to missing bounds checks * #gh:FreeRDP/FreeRDP#6882: Use default sound device on mac * Mon Mar 01 2021 jweberhofer@weberhofer.at - Updated to release 2.3.1 Noteworthy changes: * This is a compatibility bugfix release readding some (deprecated) symbols/defines * Also add some more EXPERIMENTAL warnings to CMake flags as some were not clear enough. * Fixed a memory leak in xfreerdp (mouse pointer updates) * No longer activating some compile time debug options with - DWITH_DEBUG_ALL=ON which might leak sensitive information. * Added -DDEFINE_NO_DEPRECATED for developers to detect use of deprecated symbols * Thu Feb 25 2021 jweberhofer@weberhofer.at - Updated to release 2.3.0 Noteworthy changes: * Websocket support for proxy connections * Progressive codec improvements. Reduces graphical glitches against windows and ogon servers * Fixed +glyph-cache, now working properly without disconnects * Huge file support in clipboard * XWayland support for xfreerdp (keyboard grabbing) * Improved wlfreerdp (wayland client) * Option to allow keyboard scancodes to be remapped manually * Improved mouse wheel behaviour when scrolling * Improved dynamic channel behaviour, more stable event detection * New connection state PubSub notification: Clients can now monitor current connection state Fixes: * gh#FreeRDP/FreeRDP/6626: Fixed parsing of FastGlyph order. gh#FreeRDP/FreeRDP/6624: Added support for xwayland keyboard grab gh#FreeRDP/FreeRDP/6492: Added clipboard CB_HUGE_FILE_SUPPORT_ENABLED flag gh#FreeRDP/FreeRDP/6428: Improve NLA error code logging. gh#FreeRDP/FreeRDP/6416: Http gateway message support gh#FreeRDP/FreeRDP/6753: List of pull requests to backport for stable-next - Added freerdp-rpmlintrc to supress a false positive as gethostbyname() is a windows-function call not a unix one. * Mon Jul 20 2020 jweberhofer@weberhofer.at - Updated to release 2.2.0 (boo#1174321, gh#FreeRDP/FreeRDP#6381) * SECURITY: CVE-2020-15103 - Integer overflow due to missing input sanitation in rdpegfx channel * Sound & mic - filter GSM codec for microphone redirection (gh#FreeRDP/FreeRDP#6263) * windows client title length (gh#FreeRDP/FreeRDP#6335) * "Alternate Secondary Drawing Order UNKNOWN" (gh#FreeRDP/FreeRDP#6370) * remoteapp with dialog is disconnecting when it loses focus (gh#FreeRDP/FreeRDP#6298) * v2.1.2: Can't connect to Windows7 (gh#FreeRDP/FreeRDP#6299) * fix: memory leak in nsc * urbdrc: some fixes and improvements * build: use cmake to detect getlogin_r, improve asan checks/detection * server/proxy: - new: support for heartbeats - new: support for rail handshake ex flags - fix: possible race condition with redirects * Drop upstream fixed patch: freerdp-CVE-2020-15103.patch - Removed freerdp_Mask_CACHED_BRUSH_when_checking_brush_style.patch * Fri Jul 17 2020 qkzhu@suse.com - Drop BuildRequires of libavcodec for Leap/SLE (bsc#1174200) * Thu Jul 02 2020 jweberhofer@weberhofer.at - Added freerdp_Mask_CACHED_BRUSH_when_checking_brush_style.patch which fixed frequent crashes described in boo#1173605 and gh#FreeRDP/FreeRDP#6298 * Mon Jun 22 2020 jweberhofer@weberhofer.at - Updated to release 2.1.2 (boo#1173247) * CVE-2020-4033 Out of bound read in RLEDECOMPRESS * CVE-2020-4031 Use-After-Free in gdi_SelectObject * CVE-2020-4032 Integer casting vulnerability in `update_recv_secondary_order` * CVE-2020-4030 OOB read in `TrioParse` * CVE-2020-11099 OOB Read in license_read_new_or_upgrade_license_packet * CVE-2020-11098 Out-of-bound read in glyph_cache_put * CVE-2020-11097 OOB read in ntlm_av_pair_get * CVE-2020-11095 Global OOB read in update_recv_primary_order * CVE-2020-11096 Global OOB read in update_read_cache_bitmap_v3_order * Gateway RPC fixes for windows * Fixed resource fee race resulting in double free in USB redirection * Fixed wayland client crashes * Fixed X11 client mouse mapping issues (X11 mapping on/off) * Some proxy related improvements (capture module) * Code cleanup (use getlogin_r, ...) - Removed obsolete upstream patch freerdp-bug-6205.patch * Wed May 20 2020 jweberhofer@weberhofer.at - Updated to release 2.1.1 (boo#1171441) * CVE-2020-13396: GHSL-2020-100 OOB Read in ntlm_read_ChallengeMessage * CVE-2020-13397: GHSL-2020-101 OOB Read in security_fips_decrypt due to uninitialized value * CVE-2020-13398: GHSL-2020-102 OOB Write in crypto_rsa_common * Enforce synchronous legacy RDP encryption count (#6156) * Fixed some leaks and crashes missed in 2.1.0 * Removed dynamic channel listener limits * Lots of resource cleanup fixes (clang sanitizers) * A couple of performance improvements * Various small annoyances eliminated (typos, prefilled username for windows client, ...) - Removed freerdp-bug-6175.patch and freerdp-bug-6207.patch because included in upstream * Wed May 20 2020 jweberhofer@weberhofer.at - Added freerdp-bug-6205.patch to fix reading newline on certificate accept gh#FreeRDP/FreeRDP#6205 - Added freerdp-bug-6175.patch to fix Certificate Checking Recently Broke gh#FreeRDP/FreeRDP#6148 - Added freerdp-bug-6207.patch to fix Abort on first possible certificate validation error gh#FreeRDP/FreeRDP#6207 * Fri May 08 2020 jweberhofer@weberhofer.at - Updated to release 2.1.0 (boo#1171441) * Fixed CVEs: - CVE-2020-11039 - CVE-2020-11038 - CVE-2020-11043 - CVE-2020-11040 - CVE-2020-11041 - CVE-2020-11019 - CVE-2020-11017 - CVE-2020-11018 * Fixed leak and crashing issues: - gh#FreeRDP/FreeRDP#6129 - gh#FreeRDP/FreeRDP#6128 - gh#FreeRDP/FreeRDP#6127 - gh#FreeRDP/FreeRDP#6110 - gh#FreeRDP/FreeRDP#6081 - gh#FreeRDP/FreeRDP#6077 * Noteworthy features and improvements: - Fixed sound issues (gh#FreeRDP/FreeRDP#6043) - New expert command line options /tune and /tune-list to modify all client settings in a generic way. - Fixes for smartcard cache, this improves compatibility of smartcard devices with newer smartcard channel. - Shadow server can now be instructed to listen to multiple interfaces. - Improved server certificate support (gh#FreeRDP/FreeRDP#6052) - Various fixes for wayland client (fullscreen, mouse wheel, ...) - Fixed large mouse pointer support, now mouse pointers > 96x96 pixel are visible. - USB redirection command line improvements (filter options) - Various translation improvements for android and ios clients - Removed upstream patches fix-freerdp-2.0.0-usbdk-build.patch and fix-URBDRC_DEVICE_ADD_FLAG-definitions.patch * Fri Apr 17 2020 jweberhofer@weberhofer.at - Updated and reviewed make command and added fix-freerdp-2.0.0-usbdk-build.patch to fix boo#1169679 and make USB working again - Fixed build for SLE_12 - Cleaned up spec file * Fri Apr 17 2020 mliska@suse.cz - Add fix-URBDRC_DEVICE_ADD_FLAG-definitions.patch in order to fix boo#1169748. * Mon Apr 13 2020 jweberhofer@weberhofer.at - Added cairo support for scaling - Cleaned up spec * Sun Apr 12 2020 jweberhofer@weberhofer.at - Removed patch freerdp-Fix-realloc-return-handling.patch - Added pkgconfig(libusb-1.0) for building - Added new package for freerdp-proxy - Cleaned up spec file - Updated to release 2.0.0 * Fixed CVEs: - CVE-2020-11521 - CVE-2020-11522 - CVE-2020-11523 - CVE-2020-11524 - CVE-2020-11525 - CVE-2020-11526 * Fixed security related issues: - gh#FreeRDP/FreeRDP#6005 - gh#FreeRDP/FreeRDP#6006 - gh#FreeRDP/FreeRDP#6007 - gh#FreeRDP/FreeRDP#6008 - gh#FreeRDP/FreeRDP#6009 - gh#FreeRDP/FreeRDP#6010 - gh#FreeRDP/FreeRDP#6011 - gh#FreeRDP/FreeRDP#6012 - gh#FreeRDP/FreeRDP#6013 * sha256 is now used instead of sha1 to fingerprint certificates. This will invalidate all hosts in FreeRDP known_hosts2 file and causes a prompt if a new connection is established after the update * First version of the RDP proxy was added (gh#FreeRDP/FreeRDP#5372) thanks to @kubistika * Smartcard received some refactoring. Missing functions were added and input validation was improved (gh#FreeRDP/FreeRDP#5884) * A new option /cert that unifies all certificate related options (gh#FreeRDP/FreeRDP#5880) The old options (cert-ignore, cert-deny, cert-name, cert-tofu) are still available but marked as deprecated * Support for Remote Assistance Protocol Version 2 [MS-RA] * The DirectFB client was removed because it was unmaintained * Unified initialization of OrderSupport * Fix for licensing against Windows Server 2003 * Font smoothing is now enabled per default * Smart scaling for Wayland using libcairo was added (gh#FreeRDP/FreeRDP#5215) * Unified update->BeginPaint and update->EndPaint * An image scaling API for software drawing was added * Rail was updated to the latest spec version 28.0 * Support for H.264 in the shadow server is now detected at runtime * Add mask=<value> option for /gfx and /gfx-h264 (gh#FreeRDP/FreeRDP#5771) * A new option /timeout was added to adjust the TCP ACK timeout (gh#FreeRDP/FreeRDP#5987) * Fri Mar 20 2020 guillaume.gardet@opensuse.org - Disable LTO on aarch64 and %arm to fix build * Mon Oct 28 2019 fezhang@suse.com - Add freerdp-Fix-realloc-return-handling.patch: Fix realloc return handling that results in memory leaks (boo#1153163, boo#1153164, gh#FreeRDP/FreeRDP#5645, CVE-2019-17177, CVE-2019-17178) * Wed Apr 17 2019 fezhang@suse.com - Add Requires: lib%{name}%{major_version} = %{version}-%{release}: freerdp should depend on the same release of libfreerdp2 (boo#1129193) * Tue Nov 20 2018 jweberhofer@weberhofer.at - upgrade to version 2.0.0-rc4 (FATE#326739) * Fix the following issues: - CVE-2018-8784, boo#1116708 - CVE-2018-8785, boo#1117967 - CVE-2018-8786, boo#1117966 - CVE-2018-8787, boo#1117964 - CVE-2018-8788, boo#1117963 - CVE-2018-8789, boo#1117965 - CVE-2018-1000852, boo#1120507 * Security and stability improvements, including boo#1103557 and boo#1112028 * Refactored ntlm_av_pairs API * gateway: multiple fixes and improvements * client/X11: support for rail (remote app) icons was added * the licensing code was re-worked: Per-device licenses are now saved on the client and used on re-connect: WARNING: this is a change in FreeRDP behavior regarding licensing WARNING: this is a change in FreeRDP behavior regarding licensing. If the old behavior is required, or no licenses should be saved use the new command line option +old-license (gh#/FreeRDP/FreeRDP#4979) * improve order handling - only orders that were enabled during capability exchange are accepted. WARNING and NOTE: some servers do improperly send orders that weren't negotiated, for such cases the new command line option /relax-order-checks was added to disable the strict order checking. If connecting to xrdp the options /relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926) * /smartcard has now support for substring filters (gh#/FreeRDP/FreeRDP#4840) for details see https://github.com/FreeRDP/FreeRDP/wiki/smartcard-logon * add new command line option /smartcard-logon to allow smartcard login (currently only with RDP security) * add support to set tls security level (for openssl >= 1.1.0) - default level is set to 1 - the new command line option /tls-seclevel:[LEVEL] allows to set a different level if required * new command line option: /window-position to allow positioning the window on startup * client/X11: set window title before mapping * rdpsnd/audin (mostly server side) add support for audio re-sampling using soxr or ffmpeg * Wed Aug 08 2018 jweberhofer@weberhofer.at - upgrade to version 2.0.0-rc3 See: https://github.com/FreeRDP/FreeRDP/milestone/9?closed=1 * Improved and cleaned up the command line interface * Fixed automount issues * Fixed several audio and microphone related issues * Implemented AAC and MP3 codecs * Added Wave2 support * Addedd dynamic resolution with full screen toggle support * Improved redirection handling and certificate issues * Improved automatic reconnects * Improced connection error handling * Fixed invalid pointer, double-free, integer underflow, buffer overflows issues as well as other memory leaks * fixed X11 Right-Ctrl ungrab feature * winpr: Updates time zone data to April 2018 * added libressl compatibility * Mon May 14 2018 jweberhofer@weberhofer.at - removed SLE11 condition - removed no_connection_to_windows_10_17101.patch - removed -DBUILTIN_CHANNELS=OFF switch - explicitly set -DCHANNEL_GEOMETRY=ON - Disable the new X264 and OPENH264 codecs because openSUSE does not provide them - upgrade to version 2.0.0-rc2 See: https://github.com/FreeRDP/FreeRDP/milestone/8 Noteworthy features and improvements: * IMPORTANT: add support CredSSP v6 - this fixes KB4088776 see #4449, #4488 * basic support for the "Video Optimized Remoting Virtual Channel Extension" (MS-RDPEVOR) was added * many smart card related fixes and cleanups #4312 * fix ccache support * add support for memory and thread sanitizer * support for dynamic resloution changes was added in xfreerdp #4313 * support for gateway access token (command line option /gat) was added * initial support for travis-ci.org was added * SSE optimization version of RGB to AVC444 frame split was added * build: -msse2/-msse3 are not enabled globally anymore Fixed github issues (excerpt): * #4227 Convert settings->Password to binary blob * #4231 freerdp-2.0.0_rc0: 5 tests failed out of 184 on ppc * #4276 Big endian fixes * #4291 xfreerdp “Segmentation fault” when connecting to freerdp-shadow-cli * #4293 [X11] shadow server memory corruption with /monitors:2 #4293 * #4296 drive redirection - raise an error if the directory can't be found * #4306 Cannot connect to shadow server with NLA auth: SEC_E_OUT_OF_SEQUENCE (boo#1085416, boo#1087240, boo#1104918, CVE-2018-0886) * #4457 Fix /size: /w: /h: with /monitors: (Fix custom sizes) * #4527 pre-connection blob (pcb) support in .rdp files * #4552 Fix Windows 10 cursors drawing as black * smartcard related: #3521, #3431, #3474, #3488, #775, #1424 * Tue Apr 24 2018 bruno@ioda-net.ch - Fix boo#1090677 activate pulse optional component * Thu Mar 15 2018 jweberhofer@weberhofer.at - Added no_connection_to_windows_10_17101.patch to fix Windows-connection-problem after Windows march 2018 updates. This fix is related to boo#1085416 * Mon Mar 12 2018 crrodriguez@opensuse.org - Do not use xorg-x11-devel, instead buildrequire individual x components. - Only attempt to ge rid of __DATE__ and __TIME__ if SOURCE_DATE_EPOCH is not set. * Thu Jan 11 2018 jweberhofer@weberhofer.at - Users can connect only once wo windows sessions due to [#]gh/FreeRDP/FreeRDP/4348 Therefore WITH_GSSAPI has been disabled until that issue has been solved * Thu Nov 30 2017 jweberhofer@weberhofer.at - Updated to 2.0.0-rc1 Noteworthy features and improvements: * support for FIPS mode was added (option +fipsmode) * initial client side kerberos support (run cmake with WITH_GSSAPI) * support for ssh-agent redirection (as rdp channel) * the man page(s) and /help were updated an improved * add support for ICU for unicode conversion (-DWITH_ICU=ON) * client add option to force password prompt before connection (/from-stdin[:force]) * extend /size to allow width or height percentages (#gh/FreeRDP/FreeRDP/4146) * add support for "password is pin" * clipboard is now enabled per default (use -clipboard to disable) Fixed github issues (excerpt): * #gh/FreeRDP/FreeRDP/4281: Added option to prefer IPv6 over IPv4 * #gh/FreeRDP/FreeRDP/3890: Point to OpenSSL doc for private CA * #gh/FreeRDP/FreeRDP/3378: support 31 static channels as described in the spec * #gh/FreeRDP/FreeRDP/4253: Rfx decode tile width. * #gh/FreeRDP/FreeRDP/3267: fix parsing of drivestoredirect * #gh/FreeRDP/FreeRDP/4257: Proper error checks for /kbd argument * #gh/FreeRDP/FreeRDP/4249: Corruption due to recursive parser * #gh/FreeRDP/FreeRDP/4111: 15bpp color handling for brush. * #gh/FreeRDP/FreeRDP/3509: Added Ctrl+Alt+Enter description * #gh/FreeRDP/FreeRDP/3211: Return freerdp error from main. * #gh/FreeRDP/FreeRDP/3513: add better description for drive redirection * #gh/FreeRDP/FreeRDP/4199: ConvertFindDataAToW string length * #gh/FreeRDP/FreeRDP/4135: client/x11: fix colors on big endian * #gh/FreeRDP/FreeRDP/4089: fix h264 context leak when DeleteSurface * #gh/FreeRDP/FreeRDP/4117: possible segfault * #gh/FreeRDP/FreeRDP/4091: fix a regression with remote program * Mon Sep 04 2017 jengelh@inai.de - Remove extraneous Obsoletes for packages that never existed in openSUSE:Factory or X11:RemoteDesktop. - Rename libuwac0-devel to uwac0-devel and libwinpr-devel to winpr-devel, as that seems to be their upstream name which packages are encouraged to stick to. - Remove duplicated pkgconfig requires (these are autodetected). * Fri Sep 01 2017 jweberhofer@weberhofer.at - Fixed download location * Fri Sep 01 2017 jweberhofer@weberhofer.at - Switched to official RC0 - Create wayland client package and libuwac0 package - Create separate libwinpr2 to be used in other packages - enabled gstreamer (currently disabled for tumbleweed) - enabled kerberos authentication - Update to official RC0 Fix the following issues identified by the CISCO TALOS project: * TALOS-2017-0336 CVE-2017-2834 boo#1050714 * TALOS-2017-0337 CVE-2017-2835 boo#1050712 * TALOS-2017-0338 CVE-2017-2836 boo#1050699 * TALOS-2017-0339 CVE-2017-2837 boo#1050704 * TALOS-2017-0340 CVE-2017-2838 boo#1050708 * TALOS-2017-0341 CVE-2017-2839 boo#1050711 * Sun Jun 11 2017 bruno@ioda-net.ch - Redo history by using changelog url - Update to version 2.0.0~git.1497095982.1dbd2d28d: See https://github.com/freerdp/freeRDP/compare/043243f...1dbd2d28d for full details. - Packaging : + Move to xz tarball in _service + Remove 3472.patch merged upstream - Update to version 2.0.0~git.1496304402.c42ccb508: See https://github.com/freerdp/freeRDP/compare/043243f...c42ccb508 for changes. * Sat Jun 10 2017 meissner@suse.com - Forcefully enable PIE in CFLAGS as the automatism did not work. * Tue Jan 17 2017 bruno@ioda-net.ch - Add 3472.patch until upstream #3472 isssue is fixed and PR merged this fix boo#1004108 * Wed Oct 26 2016 dimstar@opensuse.org - Update to version 2.0.0~git.1477034991.043243f: * fixed kerberos authentication * shadow/rdpsnd: Fix race condition in rdpsnd channel server. The output buffer and format parameters are not protected. * wfreerdp: fix invalid VerifyCertificate callback * rdpsnd/server: decrease audio latency and make it configurable. * Add an environment variables section to the man * protocol violation: rdp_read_extended_info_packet * Added support for OpenH264 1.6 * freerdp: fix sending of TLS alert on NLA failure, add better handling of server-side NLA in shadow server * freerdp: add configurable NTLM SAM file option for server-side NLA * freerdp: make modifications to NLA server-side fixes according to PR comments * Fixed a windows 8.1 issue. * Wed May 18 2016 jengelh@inai.de - Kill off __DATE__ from built sources. * Tue May 17 2016 fezhang@suse.com - Update to GNOME 3.20.2 FATE#318572 - Add obs git integration. - Update to version 2.0.0git.1463131968.4e66df7: + Fixed memory leaks. + wfreerdp: fix name build without client interface + libfreerdp-codec: fix xcrush decompression, revert remote control fix + KB3153731: May 2016 DST update for Azerbaijan, Chile, Haiti and Morocco + libfreerdp-codec: make proper xcrush context reset fix * Wed May 04 2016 fezhang@suse.com - Update to version 2.0.0, git master branch id a7ca42e (FATE#319661), no upstream changelog available. * Warning: This is a git snapshot regarded as technical preview by upstream. * Warning: For xfreerdp, new /long-option commandline interfaces have replaced the old --long-option interfaces. Existing user scripts need to migrate to the new interfaces to avoid breakages. For more details, see: https://github.com/FreeRDP/FreeRDP/wiki/CommandLineInterface * Add Network Level Ahthentication support. * Add Windows Portable Runtime. For more details, see: http://www.freerdp.com/2012/05/24/winpr-windows-portable-runtime * Obsolete libfreerdp-1_0-plugins. - Drop FindALSA.cmake: deprecated - Drop freerdp_branch-1.0.x_fix-kpdivide-issue831.patch: fixed upstream, implemention now in include/freerdp/scancode.h. - Drop freerdp-CVE-2014-0250.patch (bnc#880317): fixed upstream 532c420. - Drop freerdp-CVE-2014-0791.patch (bnc#857491): fixed upstream f1d6afc. - Drop freerdp-fix-FindPCSC-macro.patch: fixed upstream 9148af3. - Drop freerdp-handle-null-device-name.patch (bnc#785437): deprecated, related implementation dropped. was: freerdp-fix-pulse-no-device-name.patch
/usr/lib64/libwinpr-tools2.so.2 /usr/lib64/libwinpr-tools2.so.2.11.2 /usr/lib64/libwinpr2.so.2 /usr/lib64/libwinpr2.so.2.11.2 /usr/share/licenses/libwinpr2-2 /usr/share/licenses/libwinpr2-2/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:22:04 2024