This patch release adds missing bounds checks.
Two buffer overflow vulnerabilities were reported by Frederik Reiter who also provided patches to fix them.
There are potential security implications, but only authenticated clients would be able to exploit these vulnerabilities, if at all. Nevertheless, it is prudent to update as soon as possible.
Andri Yngvason (3):
server: Clamp damage to fb size
server: Turn read buffer bounds assert into panic
Release v0.9.2
Frederik Reiter (3):
Fix integer underflow in encodings_to_string_list
Add size validation to on_client_set_desktop_size_event
Add size validation to on_client_set_encodings