[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#919281: marked as done (freerdp2-x11: fails for smartcard login with SCARD_E_INSUFFICIENT_BUFFER)



Your message dated Sat, 13 Jun 2020 15:47:07 +0000
with message-id <E1jk8N9-000Cbn-Vr@fasolo.debian.org>
and subject line Bug#919281: fixed in freerdp2 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2
has caused the Debian Bug report #919281,
regarding freerdp2-x11: fails for smartcard login with SCARD_E_INSUFFICIENT_BUFFER
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
919281: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919281
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: freerdp2-x11
Version: 2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1
Severity: normal

in contrast to freerdp-x11 1.1.0~git20140921.1.440916e+dfsg1-13+deb9u2
freerdp2-x11 fails while trying a smartcard-logon to our several
windows servers. The error messages is:

[14:11:49:046] [14684:14732]
[WARN][com.freerdp.channels.smartcard.client] - IRP failure:
SCardStatusW (0x000900CC), status: SCARD_E_INSUFFICIENT_BUFFER
(0x80100008)

It might be depending on the size of the certificate we have on our
smartcards.
Until about spring last year we could use remmina from
stretch-backports, but then it suddenly stopped to work and we could
not find a reason. The we switched to freerdp 1 which still works
without problems.

so freerdp2 is not working as a dropin replacement now.

-- System Information:
Debian Release: 9.6
  APT prefers stable-updates
  APT policy: (700, 'stable-updates'), (700, 'stable'), (50, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-8-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8),
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages freerdp2-x11 depends on:
ii  libc6                 2.24-11+deb9u3
ii  libfreerdp-client2-2  2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1
ii  libfreerdp2-2         2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1
ii  libwinpr2-2           2.0.0~git20181120.1.e21b72c95+dfsg1-1~bpo9+1
ii  libx11-6              2:1.6.4-3+deb9u1
ii  libxcursor1           1:1.1.14-1+deb9u2
ii  libxext6              2:1.3.3-1+b2
ii  libxfixes3            1:5.0.3-1
ii  libxi6                2:1.7.9-1
ii  libxinerama1          2:1.1.3-1+b3
ii  libxrandr2            2:1.5.1-1
ii  libxrender1           1:0.9.10-1
ii  libxv1                2:1.0.11-1

freerdp2-x11 recommends no packages.

freerdp2-x11 suggests no packages.

-- no debconf information
<
-- 
============================================================================
Christoph Martin, Leiter Unix-Systeme
Zentrum für Datenverarbeitung, Uni-Mainz, Germany
 Anselm Franz von Bentzel-Weg 12, 55128 Mainz
 Telefon: +49(6131)3926337
 Instant-Messaging: Jabber/XMPP: martin@jabber.uni-mainz.de


Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: freerdp2
Source-Version: 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2
Done: Mike Gabriel <sunweaver@debian.org>

We believe that the bug you reported is fixed in the latest version of
freerdp2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 919281@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mike Gabriel <sunweaver@debian.org> (supplier of updated freerdp2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 01 Jun 2020 13:08:46 +0200
Source: freerdp2
Architecture: source
Version: 2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2
Distribution: buster
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org>
Changed-By: Mike Gabriel <sunweaver@debian.org>
Closes: 919281
Changes:
 freerdp2 (2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2) buster; urgency=medium
 .
   [ Bernhard Miklautz ]
   * debian/patches - security releated backports from upstream
     * Add 0003-Fixed-6007-Boundary-checks-in-rdp_read_flow_control.patch
     * Add 0004-Fixed-6009-Bounds-checks-in-autodetect_recv_bandwidt.patch
     * Add 0005-Fixed-6006-bounds-checks-in-update_read_synchronize.patch
     * Add 0006-Fixed-6005-Bounds-checks-in-update_read_bitmap_data.patch
     * Add 0007-Fixed-6011-Bounds-check-in-rdp_read_font_capability.patch
     * Add 0008-Fixed-6013-Check-new-length-is-0.patch
     * Add 0009-Fix-6010-Check-length-in-read_icon_info.patch
     * Add 0010-Use-substreams-to-parse-gcc_read_server_data_blocks.patch
     * Add 0011-Fixed-Stream_-macros-bracing-arguments.patch
     * Add 0012-Use-safe-seek-for-capability-parsing.patch
     * Add 0013-Fixed-CVE-2020-11525-Out-of-bounds-read-in-bitmap_ca.patch
       (CVE-2020-11525).
     * Add 0014-Fixed-6012-CVE-2020-11526-Out-of-bounds-read-in-upda.patch
       (CVE-2020-11526).
     * Add 0015-Fix-CVE-2020-11523-clamp-invalid-rectangles-to-size-.patch
       (CVE-2020-11523).
     * Add 0016-Fix-CVE-2020-11524-out-of-bounds-access-in-interleav.patch
       (CVE-2020-11524).
     * Add 0017-Fixed-CVE-2020-11522-Limit-number-of-DELTA_RECT-to-4.patch
       (CVE-2020-11522).
     * Add 0018-Fixed-CVE-2020-11521-Out-of-bounds-write-in-planar-c.patch
       (CVE-2020-11521).
     * Add 0019-Fixed-possible-NULL-access.patch
     * Add 0020-Check-for-int-overflow-in-gdi_InvalidateRegion.patch
 .
   [ Mike Gabriel ]
   * debian/patches:
     + Add 0002_fix-channels-smartcard-fix-statusw-call.patch. Fix smartcard
       login failures. (Closes: #919281).
Checksums-Sha1:
 0aecc531cd84fbfeec8e8896146020eccce7ca3e 3744 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc
 e16c4cc8b1a7ea31e29338925bf29f3e15c9f18a 50512 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz
 ae0fb5fe75cfc8f22ae4fb4a8d09c2a4bdb03d86 15945 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo
Checksums-Sha256:
 ea487af126f5bdcfe0ee8f0bda64c87f41c9f6b346e9d8d724f7ae35dd303125 3744 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc
 89d7d31cb8c9c0081d5e1ac5c72221ac4dc5bc25bdefa453e2f3f6ec925b9cf3 50512 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz
 dc2ab78af7d6d9d0d6e06fb061260991d1d458ba719a9e6e40b27e9c8bce93b6 15945 freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo
Files:
 820beef85c310714ec9b916f7d099952 3744 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.dsc
 3ffd0bc6f6b0c5ce6847c645ab9311e7 50512 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2.debian.tar.xz
 b67d1f63ad376d8cb26400e385efd2cc 15945 x11 optional freerdp2_2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=4hyY
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: