Your message dated Sat, 13 Jun 2020 15:47:07 +0000 with message-id <E1jk8N9-000Cbn-Vr@fasolo.debian.org> and subject line Bug#919281: fixed in freerdp2 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2 has caused the Debian Bug report #919281, regarding freerdp2-x11: fails for smartcard login with SCARD_E_INSUFFICIENT_BUFFER to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 919281: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919281 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: freerdp2-x11: fails for smartcard login with SCARD_E_INSUFFICIENT_BUFFER
- From: Christoph Martin <martin@uni-mainz.de>
- Date: Mon, 14 Jan 2019 14:40:10 +0100
- Message-id: <d2b0d0ec-195a-4125-aec5-6c6ec4cae980@uni-mainz.de>
Package: freerdp2-x11 Version: 2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1 Severity: normal in contrast to freerdp-x11 1.1.0~git20140921.1.440916e+dfsg1-13+deb9u2 freerdp2-x11 fails while trying a smartcard-logon to our several windows servers. The error messages is: [14:11:49:046] [14684:14732] [WARN][com.freerdp.channels.smartcard.client] - IRP failure: SCardStatusW (0x000900CC), status: SCARD_E_INSUFFICIENT_BUFFER (0x80100008) It might be depending on the size of the certificate we have on our smartcards. Until about spring last year we could use remmina from stretch-backports, but then it suddenly stopped to work and we could not find a reason. The we switched to freerdp 1 which still works without problems. so freerdp2 is not working as a dropin replacement now. -- System Information: Debian Release: 9.6 APT prefers stable-updates APT policy: (700, 'stable-updates'), (700, 'stable'), (50, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-8-amd64 (SMP w/8 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages freerdp2-x11 depends on: ii libc6 2.24-11+deb9u3 ii libfreerdp-client2-2 2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1 ii libfreerdp2-2 2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1 ii libwinpr2-2 2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1 ii libx11-6 2:1.6.4-3+deb9u1 ii libxcursor1 1:1.1.14-1+deb9u2 ii libxext6 2:1.3.3-1+b2 ii libxfixes3 1:5.0.3-1 ii libxi6 2:1.7.9-1 ii libxinerama1 2:1.1.3-1+b3 ii libxrandr2 2:1.5.1-1 ii libxrender1 1:0.9.10-1 ii libxv1 2:1.0.11-1 freerdp2-x11 recommends no packages. freerdp2-x11 suggests no packages. -- no debconf information < -- ============================================================================ Christoph Martin, Leiter Unix-Systeme Zentrum für Datenverarbeitung, Uni-Mainz, Germany Anselm Franz von Bentzel-Weg 12, 55128 Mainz Telefon: +49(6131)3926337 Instant-Messaging: Jabber/XMPP: martin@jabber.uni-mainz.deAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 919281-close@bugs.debian.org
- Subject: Bug#919281: fixed in freerdp2 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 13 Jun 2020 15:47:07 +0000
- Message-id: <E1jk8N9-000Cbn-Vr@fasolo.debian.org>
- Reply-to: Mike Gabriel <sunweaver@debian.org>
Source: freerdp2 Source-Version: 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2 Done: Mike Gabriel <sunweaver@debian.org> We believe that the bug you reported is fixed in the latest version of freerdp2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 919281@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mike Gabriel <sunweaver@debian.org> (supplier of updated freerdp2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 01 Jun 2020 13:08:46 +0200 Source: freerdp2 Architecture: source Version: 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2 Distribution: buster Urgency: medium Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org> Changed-By: Mike Gabriel <sunweaver@debian.org> Closes: 919281 Changes: freerdp2 (2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2) buster; urgency=medium . [ Bernhard Miklautz ] * debian/patches - security releated backports from upstream * Add 0003-Fixed-6007-Boundary-checks-in-rdp_read_flow_control.patch * Add 0004-Fixed-6009-Bounds-checks-in-autodetect_recv_bandwidt.patch * Add 0005-Fixed-6006-bounds-checks-in-update_read_synchronize.patch * Add 0006-Fixed-6005-Bounds-checks-in-update_read_bitmap_data.patch * Add 0007-Fixed-6011-Bounds-check-in-rdp_read_font_capability.patch * Add 0008-Fixed-6013-Check-new-length-is-0.patch * Add 0009-Fix-6010-Check-length-in-read_icon_info.patch * Add 0010-Use-substreams-to-parse-gcc_read_server_data_blocks.patch * Add 0011-Fixed-Stream_-macros-bracing-arguments.patch * Add 0012-Use-safe-seek-for-capability-parsing.patch * Add 0013-Fixed-CVE-2020-11525-Out-of-bounds-read-in-bitmap_ca.patch (CVE-2020-11525). * Add 0014-Fixed-6012-CVE-2020-11526-Out-of-bounds-read-in-upda.patch (CVE-2020-11526). * Add 0015-Fix-CVE-2020-11523-clamp-invalid-rectangles-to-size-.patch (CVE-2020-11523). * Add 0016-Fix-CVE-2020-11524-out-of-bounds-access-in-interleav.patch (CVE-2020-11524). * Add 0017-Fixed-CVE-2020-11522-Limit-number-of-DELTA_RECT-to-4.patch (CVE-2020-11522). * Add 0018-Fixed-CVE-2020-11521-Out-of-bounds-write-in-planar-c.patch (CVE-2020-11521). * Add 0019-Fixed-possible-NULL-access.patch * Add 0020-Check-for-int-overflow-in-gdi_InvalidateRegion.patch . [ Mike Gabriel ] * debian/patches: + Add 0002_fix-channels-smartcard-fix-statusw-call.patch. Fix smartcard login failures. (Closes: #919281). Checksums-Sha1: 0aecc531cd84fbfeec8e8896146020eccce7ca3e 3744 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc e16c4cc8b1a7ea31e29338925bf29f3e15c9f18a 50512 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz ae0fb5fe75cfc8f22ae4fb4a8d09c2a4bdb03d86 15945 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo Checksums-Sha256: ea487af126f5bdcfe0ee8f0bda64c87f41c9f6b346e9d8d724f7ae35dd303125 3744 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc 89d7d31cb8c9c0081d5e1ac5c72221ac4dc5bc25bdefa453e2f3f6ec925b9cf3 50512 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz dc2ab78af7d6d9d0d6e06fb061260991d1d458ba719a9e6e40b27e9c8bce93b6 15945 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo Files: 820beef85c310714ec9b916f7d099952 3744 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc 3ffd0bc6f6b0c5ce6847c645ab9311e7 50512 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz b67d1f63ad376d8cb26400e385efd2cc 15945 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJJBAEBCAAzFiEEm/uu6GwKpf+/IgeCmvRrMCV3GzEFAl7U4ywVHHN1bndlYXZl ckBkZWJpYW4ub3JnAAoJEJr0azAldxsxajQP/0KZuMaD2VDtaQ0A2FxRfcY9Te+P DLUti4qKYsop83vksAimOyXUyqpIhDoZ83QLq7laq/BXnbHqL0aPxMwngLBthjXS 0UtqXuYcB0bffTh+0kAaOzvL/V/QVpKwfd1tycOSBTUBAZfzb+IQMDVTwMuH8Nso ztkOD2lOnwI5Bj1gbfFoHr3dNsg5aGyJGo66OxQmT+YZ7Y/Jq8MuO9RLpxytR+Rn YydVNb7ncY8v9EBqnhAtodjFyzBnOOKx+s9ZIOxn2z5K+Y4777SYPOOFZTisV1Oc b0tDsAR8xzE5EhIcpUQO4szI015LMDWma3fhOR7MzsP5FwIe2qmwIHqCbmcnevBG e3QDs95FgFo4aYgMkwbxc1nw14yoe4q48TVjq5WiidxpZkn7DQntVg+ls7Cpo0aY wBuiA1h3ayvTHMbnI8JX+Bg+wC6ZvdRVu34qcAhtzhWf4wSn3wyyuOU5qOdxw1fY ibRknZB4jC8oEfmC5l2JWErj6a1VKTnhRKdAHvVJ2bKVe1Q7ugJr4Ae3YW985EQo bzoUVQMjmZ3FUxOwgKIevdqKDHR/dDXXxyd8ptAWugyoNIzRYOXLBUfit+i+KXtA KyFFISscLf+OgF9oKxd6pYn7W++hcRqgycbKywbKq5kfval7o6hXS+zD6zgq962V YK9IQ5D8RoUsrggS =4hyY -----END PGP SIGNATURE-----
--- End Message ---