forked from leonnnn/pyxtrlock
-
Notifications
You must be signed in to change notification settings - Fork 0
/
CHANGELOG
30 lines (27 loc) · 1.29 KB
/
CHANGELOG
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Release 0.4:
• Security: Refuse to run if wayland session is detected. Running in a wayland
is insecure.
Release 0.3:
• Enhancement: Make pyxtrlock conform to the XDG specification. Patch by
Cristian Ciupitu.
• Enhancement: Ship script to create an empty lock symbol. Patch by Alexander
Klink.
• Enhancement: Retry grabbing the keyboard as well as the mouse to
prevent issues when starting pyxtrlock from a keyboard shortcut.
Patch by Nils Ballmann.
• Enhancement: Support the XSS_SLEEP_LOCK_FD protocol implemented by
xss-lock with the option -l to inhibit standby/hibernate/... until
the the screen is locked.
Release 0.2 :
• Security: Check correctly for the result of the
xcb_grab_{pointer,keyboard} commands (CVE-2013-4427).
• Security: Limit length of buffered password to prevent memory exhaustion
(this is a real concern when attacked with custom hardware which
simulates most rapid keystrokes)
• Security: Fix several memory leaks
• Enhancement: Report missing libraries when loading via ctypes.
• Enhancement: Provide ability and tools to use custom lock images as cursor
Release 0.1:
• [#8] Security: Fixed a typo that could in some circumstances lead to a
crash after multiple failed authentication attempts. Thanks,
Paul Lhussiez (CVE-2013-4426).