Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
README.md | 2023-08-23 | 4.0 kB | |
turbovnc_2.2.3_i386.deb | 2019-09-07 | 5.0 MB | |
turbovnc_2.2.3_amd64.deb | 2019-09-07 | 5.1 MB | |
turbovnc-debuginfo-2.2.3.x86_64.rpm | 2019-09-07 | 10.1 MB | |
turbovnc-debuginfo-2.2.3.i386.rpm | 2019-09-07 | 9.9 MB | |
turbovnc-2.2.3.x86_64.rpm | 2019-09-07 | 4.9 MB | |
turbovnc-2.2.3.tar.gz.sig | 2019-09-07 | 65 Bytes | |
turbovnc-2.2.3.tar.gz | 2019-09-07 | 9.0 MB | |
turbovnc-2.2.3.src.rpm | 2019-09-07 | 9.0 MB | |
turbovnc-2.2.3.i386.rpm | 2019-09-07 | 4.7 MB | |
turbovnc-2.2.3-jws.zip | 2019-09-07 | 121.1 kB | |
TurboVNC-2.2.3.dmg | 2019-09-07 | 4.2 MB | |
TurboVNC-2.2.3-x86.exe | 2019-09-07 | 2.3 MB | |
TurboVNC-2.2.3-x64.exe | 2019-09-07 | 2.3 MB | |
Totals: 14 Items | 66.6 MB | 0 |
These packages were built with libjpeg-turbo 2.0.3:
https://sourceforge.net/projects/libjpeg-turbo/files/2.0.3/
Package signatures
To ensure the integrity of the TurboVNC binary packages, the RPM and DEB files
and the source tarball are signed using the following key:
https://www.TurboVNC.org/key/VGL-GPG-KEY-1024
https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xecf01671d05e2a105ff84dc46bbefa1972feb9ce
and the Windows installers and Mac app/package/DMG are signed using a code
signing certificate.
2.2.3
Significant changes relative to 2.2.2:
-
The Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm is now supported by the TurboVNC Server when using OpenSSL 1.0.2 or later.
-
A new security configuration file directive (
permitted-cipher-suites
) in the TurboVNC Server and a new Java system property (turbovnc.ciphersuites
) in the Java TurboVNC Viewer can now be used to specify a list of permitted TLS cipher suites for the TLS and X509 security types. -
Fixed an issue in the Mac TurboVNC Viewer whereby drawing tablet stylus buttons were ignored or mapped to incorrect mouse button events.
-
The built-in HTTP server in the TurboVNC Server now accepts
:
and@
in any TurboVNC Viewer parameters that are appended to the URL. This allows for specifying an SSH user name in theVia
parameter and an RFB display/port in theServer
parameter. -
The X RandR outputs in the TurboVNC Server have been renamed to "VNC-0", "VNC-1", etc. This prevents a dialog ("Authentication is required to create a color managed device") from popping up when using the GNOME 3 window manager on recent Linux distributions, including Fedora, RHEL 8, and Ubuntu 18 and later.
-
Fixed a packaging regression, introduced by 2.2 beta1[17], that prevented full-screen multi-screen spanning from working properly with the Mac TurboVNC Viewer app.
-
Fixed a regression introduced by 2.2 beta1[11] that caused the TurboVNC Server to leak memory when certain X11 applications or frameworks requested that clipboard updates from the X server be converted to UTF-8 (by calling
XConvertSelection()
with a target ofxaUTF8_STRING
.) -
Fixed an error ("java.lang.IllegalArgumentException: Error in security property. Constraint unknown: ECDH_ DH_RSA") that occurred when attempting to use any of the TLS* security types with the Java TurboVNC Viewer running under Java 7u211, 8u201, 11.0.2, or later with OpenSSL 1.1.x.
-
Fixed an issue (CVE-2019-15683) in the TurboVNC Server whereby a specially-crafted VNC viewer could be used to remotely trigger a stack overflow in the server by sending it a malformed RFB Fence message. This issue could never have been encountered when using any of the VNC viewers that currently support the RFB Fence message (TurboVNC and TigerVNC.) Furthermore, since exploiting the issue would have first required successfully authenticating with a TurboVNC session, the issue did not generally provide an attack vector for anyone other than the session owner and any collaborators authorized by the owner.
-
Fixed various issues with remote mouse events that would occur when running the Linux TurboVNC Viewer in a Wayland session.
-
The TurboVNC Server now generates a 2048-bit DSA key for use with the TLS security types. This fixed an error ("dh key too small") that occurred when attempting to connect, using one of those security types, to a TurboVNC session running on a RHEL 8 host. It also fixed an error ("javax.net.ssl.SSLHandshakeException: DHPublicKey does not comply to algorithm constraints") that occurred when attempting to connect, using one of the TLS security types, to a TurboVNC session with the Linux TurboVNC Viewer running on a RHEL 8 client. A new security configuration file directive (
tls-key-length
) can be used to restore the behavior of previous releases of TurboVNC (generating a 1024-bit DSA key) or to increase the key length for additional security.