Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stable backports #6285

Merged
merged 65 commits into from
Jun 22, 2020
Merged

Stable backports #6285

merged 65 commits into from
Jun 22, 2020

Conversation

akallabeth
Copy link
Member

No description provided.

akallabeth and others added 24 commits June 16, 2020 09:05
Add a updated version of script for creating the release tarball.
If TAG is set the TAG is used otherwise it is tried to detect the last
TAG using git describe.

(cherry picked from commit 93d6de2)
(cherry picked from commit 8c2c19b)
(cherry picked from commit 25f62ee)
(cherry picked from commit c97c1ca)
LoadLibraryA implementation uses the RTLD_LOCAL flag for dlopen currently.
This flag doesn't allow the symbols to be used by the subsequently loaded
libraries. This is a problem for the video channel when -DBUILTIN_CHANNELS=OFF
is used as it uses functions from the geometry channel. Let's use RTLD_GLOBAL
instead to prevent "undefined symbol" errors in such cases.

Fixes: FreeRDP#6236
(cherry picked from commit d8cd671)
…pt produces data, timeout doesn't)

(cherry picked from commit 2e4f27a)
The character '>' was being rendered as < instead of >.

(cherry picked from commit 98930bf)
This fixes the following defect reported by covscan tool:
libfreerdp/gdi/gfx.c:144: missing_unlock: Returning without unlocking "update->mux".

(cherry picked from commit 914808f)
This fixes the following defects reported by covscan tool:
 - client/Wayland/wlf_input.c:251: overrun-local: Overrunning array "contacts" of 10 32-byte elements at element index 10 (byte offset 351) using index "i" (which evaluates to 10).
 - client/Wayland/wlf_input.c:308: overrun-local: Overrunning array "contacts" of 10 32-byte elements at element index 10 (byte offset 351) using index "i" (which evaluates to 10).
 - client/Wayland/wlf_input.c:360: overrun-local: Overrunning array "contacts" of 10 32-byte elements at element index 10 (byte offset 351) using index "i" (which evaluates to 10).
 - client/Wayland/wlf_input.c:251: error[arrayIndexOutOfBounds]: Array 'contacts[10]' accessed at index 10, which is out of bounds.
 - client/Wayland/wlf_input.c:308: error[arrayIndexOutOfBounds]: Array 'contacts[10]' accessed at index 10, which is out of bounds.
 - client/Wayland/wlf_input.c:360: error[arrayIndexOutOfBounds]: Array 'contacts[10]' accessed at index 10, which is out of bounds.
 - client/Wayland/wlf_input.c:246: uninit_use_in_call: Using uninitialized value "y" when calling "wlf_scale_coordinates".
 - client/Wayland/wlf_input.c:246: uninit_use_in_call: Using uninitialized value "x" when calling "wlf_scale_coordinates".

The maximal number of touches can be higher then 10, see:
https://wayland.freedesktop.org/libinput/doc/latest/touchpads.html

Let's increse the MAX_CONTACTS count and add checks to prevent usage of
uninitialized values.

(cherry picked from commit 6ab7996)
This fixes the following defect reported by covscan tool:
 - channels/smartcard/client/smartcard_pack.c:942: uninit_use_in_call: Using uninitialized value "tmp" when calling "ConvertFromUnicode".
 - channels/smartcard/client/smartcard_pack.c:894: uninit_use_in_call: Using uninitialized value "tmp" when calling "ConvertFromUnicode".
 - channels/smartcard/client/smartcard_pack.c:475: uninit_use_in_call: Using uninitialized value "tmp" when calling "ConvertFromUnicode".

(cherry picked from commit e70e257)
This tries to fixes the following defects reported by covscan tool:
 - channels/smartcard/client/smartcard_operations.c:958: uninit_use_in_call: Using uninitialized value "ret.cReaders" when calling "smartcard_pack_locate_cards_return".
 - channels/smartcard/client/smartcard_operations.c:932: uninit_use_in_call: Using uninitialized value "ret.cReaders" when calling "smartcard_pack_locate_cards_return".

But I am not sure about it...

(cherry picked from commit 5345988)
(cherry picked from commit d1b310d)
Currently, this sets an invalid open flag and attempts to open(), which
will fail.  Instead of doing that, don't try to define O_TMPFILE where
such a definition can't exist and force the fallback rather than making
an always-fail open() call.

(cherry picked from commit 082ddb3)
@akallabeth akallabeth added this to the stable-next milestone Jun 16, 2020
@freerdp-bot
Copy link

Refer to this link for build results (access rights to CI server needed):
https://ci.freerdp.com//job/PullRequestTester/5042/

@freerdp-bot
Copy link

Refer to this link for build results (access rights to CI server needed):
https://ci.freerdp.com//job/PullRequestTester/5059/

akallabeth and others added 23 commits June 22, 2020 12:11
CVE-2020-11099 thanks to @antonio-morales for finding this.

(cherry picked from commit 6ade7b4)
CVE-2020-11098 thanks to @antonio-morales for finding this.

(cherry picked from commit c0fd449)
(cherry picked from commit 057b6df)
(cherry picked from commit 240fdd0)
(cherry picked from commit 36478d3)
(cherry picked from commit 6d86e20)
(cherry picked from commit 3ac7bb5)
(cherry picked from commit 1a02af5)
(cherry picked from commit a45afe9)
(cherry picked from commit c3a1ed7)
CVE-2020-11095 thanks @antonio-morales for finding this.

(cherry picked from commit 733ee32)
CVE-2020-11096 thanks @antonio-morales for finding this.

(cherry picked from commit b8beb55)
CVE-2020-4030 thanks to @antonio-morales for finding this.

(cherry picked from commit 05cd9ea)
CVE-2020-4032 thanks to @antonio-morales for finding this.

(cherry picked from commit e7bffa6)
CVE-2020-4033 thanks to @antonio-morales for finding this.

(cherry picked from commit 0a98c45)
CVE-2020-4031 thanks to @antonio-morales for finding this.

(cherry picked from commit f753c25)
(cherry picked from commit 1c6a692)
CVE-2020-11097 thanks to @antonio-morales for finding this.

(cherry picked from commit 58a3122)
(cherry picked from commit 308c2c3)
Thanks @anticomputer for pointing this out

(cherry picked from commit 02c5ec6)
(cherry picked from commit 5dc50f6)
@akallabeth akallabeth changed the title [WIP] Stable backports Stable backports Jun 22, 2020
@freerdp-bot
Copy link

Refer to this link for build results (access rights to CI server needed):
https://ci.freerdp.com//job/PullRequestTester/5064/

@mfleisz mfleisz merged commit 584efae into FreeRDP:stable-2.0 Jun 22, 2020
@akallabeth akallabeth deleted the stable-backports2 branch April 25, 2022 07:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

10 participants