spice-gtk.git
5 years agoMerge version 0.33-3.3+deb9u1+rpi1 and 0.33-3.3+deb9u2 to produce 0.33-3.3+deb9u2... stretch-staging archive/raspbian/0.33-3.3+deb9u2+rpi1 raspbian/0.33-3.3+deb9u2+rpi1
Raspbian automatic forward porter [Thu, 5 Nov 2020 18:05:45 +0000 (18:05 +0000)]
Merge version 0.33-3.3+deb9u1+rpi1 and 0.33-3.3+deb9u2 to produce 0.33-3.3+deb9u2+rpi1

5 years agoMerge spice-gtk (0.33-3.3+deb9u2) import into refs/heads/workingbranch
Utkarsh Gupta [Sun, 1 Nov 2020 16:10:46 +0000 (16:10 +0000)]
Merge spice-gtk (0.33-3.3+deb9u2) import into refs/heads/workingbranch

5 years ago[PATCH] quic: Avoid possible buffer overflow in find_bucket
Frediano Ziglio [Thu, 30 Apr 2020 09:19:09 +0000 (10:19 +0100)]
[PATCH] quic: Avoid possible buffer overflow in find_bucket

Proved by fuzzing the code.

Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
Acked-by: Uri Lublin <uril@redhat.com>
Gbp-Pq: Name CVE-2020-14355_part4.patch

5 years ago[PATCH] quic: Check RLE lengths
Frediano Ziglio [Wed, 29 Apr 2020 14:11:38 +0000 (15:11 +0100)]
[PATCH] quic: Check RLE lengths

Avoid buffer overflows decoding images. On compression we compute
lengths till end of line so it won't cause regressions.
Proved by fuzzing the code.

Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
Acked-by: Uri Lublin <uril@redhat.com>
Gbp-Pq: Name CVE-2020-14355_part3.patch

5 years ago[PATCH] quic: Check image size in quic_decode_begin
Frediano Ziglio [Wed, 29 Apr 2020 14:10:24 +0000 (15:10 +0100)]
[PATCH] quic: Check image size in quic_decode_begin

Avoid some overflow in code due to images too big or
negative numbers.

Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
Acked-by: Uri Lublin <uril@redhat.com>
Gbp-Pq: Name CVE-2020-14355_part2.patch

5 years ago[PATCH] quic: Check we have some data to start decoding quic image
Frediano Ziglio [Wed, 29 Apr 2020 14:09:13 +0000 (15:09 +0100)]
[PATCH] quic: Check we have some data to start decoding quic image

All paths already pass some data to quic_decode_begin but for the
test check it, it's not that expensive test.
Checking for not 0 is enough, all other words will potentially be
read calling more_io_words but we need one to avoid a potential
initial buffer overflow or deferencing an invalid pointer.

Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
Acked-by: Uri Lublin <uril@redhat.com>
Gbp-Pq: Name CVE-2020-14355_part1.patch

5 years agoFix flexible array buffer overflow
Frediano Ziglio [Fri, 18 May 2018 10:41:57 +0000 (11:41 +0100)]
Fix flexible array buffer overflow

Origin: https://gitlab.freedesktop.org/spice/spice-common/commit/bb15d4815ab586b4c4a20f4a565970a44824c42c
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2018-10873
Bug-Debian: https://bugs.debian.org/906316

This is kind of a DoS, possibly flexible array in the protocol
causes the network size check to be ignored due to integer overflows.

The size of flexible array is computed as (message_end - position),
then this size is added to the number of bytes before the array and
this number is used to check if we overflow initial message.

An example is:

    message {
        uint32 dummy[2];
        uint8 data[] @end;
    } LenMessage;

which generated this (simplified remove useless code) code:

    { /* data */
        data__nelements = message_end - (start + 8);

        data__nw_size = data__nelements;
    }

    nw_size = 8 + data__nw_size;

    /* Check if message fits in reported side */
    if (nw_size > (uintptr_t) (message_end - start)) {
        return NULL;
    }

Following code:
- data__nelements == message_end - (start + 8)
- data__nw_size == data__nelements == message_end - (start + 8)
- nw_size == 8 + data__nw_size == 8 + message_end - (start + 8) ==
  8 + message_end - start - 8 == message_end -start
- the check for overflow is (nw_size > (message_end - start)) but
  nw_size == message_end - start so the check is doing
  ((message_end - start) > (message_end - start)) which is always false.

If message_end - start < 8 then data__nelements (number of element
on the array above) computation generate an integer underflow that
later create a buffer overflow.

Add a check to make sure that the array starts before the message ends
to avoid the overflow.

Signed-off-by: Frediano Ziglio <fziglio@redhat.com>
Signed-off-by: Christophe Fergeau <cfergeau@redhat.com>
[Salvatore Bonaccorso: Drop generated diff from commit messages causing
 problem when applying with quilt. Remove addition to testsuite]

Gbp-Pq: Name Fix-flexible-array-buffer-overflow.patch

5 years agossl: Use accessors rather than direct struct access
Sebastian Andrzej Siewior [Wed, 30 Nov 2016 15:34:59 +0000 (16:34 +0100)]
ssl: Use accessors rather than direct struct access

In OpenSSL 1.1.0, the struct fields are private so we can no longer
directly access them.

The accessors are not available in previous OpenSSL releases, so we need
to add compat helpers.

Gbp-Pq: Name ssl-Use-accessors-rather-than-direct-struct-access.patch

5 years agossl: Rework our custom BIO type
Sebastian Andrzej Siewior [Wed, 26 Oct 2016 15:31:27 +0000 (17:31 +0200)]
ssl: Rework our custom BIO type

This commit changes to an actual new BIO method rather than reusing an
existing BIO method, and overriding only the fields that we need.
The approach before this commit would be causing issues with OpenSSL
1.1.0 as some of the fields we access have become opaque.

Gbp-Pq: Name ssl-Rework-our-custom-BIO-type.patch

5 years agossl: Stop creating our own X509_LOOKUP_METHOD
Sebastian Andrzej Siewior [Wed, 26 Oct 2016 10:55:03 +0000 (12:55 +0200)]
ssl: Stop creating our own X509_LOOKUP_METHOD

OpenSSL 1.1.0 does not seem to provide API to do that anymore.

There is no need to create a custom lookup to begin with. This method
here has no callbacks implemented and is doing nothing. The way I
understand it, it is used to retrieve a `lookup' object which provides a
certificate store.  The SSL ctx provides also such a store.

Acked-by: Christophe Fergeau <cfergeau@redhat.com>
Acked-by: Pavel Grunt <pgrunt@redhat.com>
Gbp-Pq: Name ssl-Stop-creating-our-own-X509_LOOKUP_METHOD.patch

5 years agodebian_843471-clipboard_Fix_crash_by_handling_error
Liang Guo [Sun, 1 Nov 2020 16:10:46 +0000 (16:10 +0000)]
debian_843471-clipboard_Fix_crash_by_handling_error

commit 03c016bea939ee4a26e90d80fa1012a993a8ea47
Author: Victor Toso <me@victortoso.com>
Origin: upstream, https://cgit.freedesktop.org/spice/spice-gtk/commit/?id=03c016bea939ee4a26e90d80fa1012a993a8ea47
Bug-Debian: https://bugs.debian.org/843471
Date:   Fri Oct 14 18:12:01 2016 +0200

    clipboard: Fix crash by handling error

    As manual states below, text could be NULL for different reasons and
    we should handle that. I've included a debug message to help
    identifying possible regressions from wayland's clipboard.

    This crash is a regression from 7b0de6217670e0f668aff2949f

     "The text parameter to callback will contain the resulting text if
     the request succeeded, or NULL if it failed. This could happen for
     various reasons, in particular if the clipboard was empty or if the
     contents of the clipboard could not be converted into text form."

    Resolves: rhbz#1384676

Signed-off-by: Victor Toso <victortoso@redhat.com>
Acked-by: Pavel Grunt <pgrunt@redhat.com>
Gbp-Pq: Name debian_843471-clipboard_Fix_crash_by_handling_error.patch

5 years agoexplicitly-enable-subdir-objects
Liang Guo [Sun, 1 Nov 2020 16:10:46 +0000 (16:10 +0000)]
explicitly-enable-subdir-objects

When subdir source is included but subdir-objects is not
enabled, automake will throw a warning which will be considered
error by debian build system

Gbp-Pq: Name explicitly-enable-subdir-objects.patch

5 years agospice-gtk (0.33-3.3+deb9u2) stretch-security; urgency=high
Utkarsh Gupta [Sun, 1 Nov 2020 16:10:46 +0000 (16:10 +0000)]
spice-gtk (0.33-3.3+deb9u2) stretch-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * Add patch to fix multiple buffer overflow vulnerabilities.
    (Fixes: CVE-2020-14355) (Closes: #971751)

[dgit import unpatched spice-gtk 0.33-3.3+deb9u2]

5 years agoImport spice-gtk_0.33-3.3+deb9u2.debian.tar.xz
Utkarsh Gupta [Sun, 1 Nov 2020 16:10:46 +0000 (16:10 +0000)]
Import spice-gtk_0.33-3.3+deb9u2.debian.tar.xz

[dgit import tarball spice-gtk 0.33-3.3+deb9u2 spice-gtk_0.33-3.3+deb9u2.debian.tar.xz]

6 years agoMerge version 0.32-1+rpi1 and 0.33-3.3+deb9u1 to produce 0.33-3.3+deb9u1+rpi1 archive/raspbian/0.33-3.3+deb9u1+rpi1 raspbian/0.33-3.3+deb9u1+rpi1
Raspbian automatic forward porter [Fri, 21 Jun 2019 22:27:25 +0000 (23:27 +0100)]
Merge version 0.32-1+rpi1 and 0.33-3.3+deb9u1 to produce 0.33-3.3+deb9u1+rpi1

7 years agoMerge spice-gtk (0.33-3.3+deb9u1) import into refs/heads/workingbranch
Salvatore Bonaccorso [Fri, 26 Oct 2018 15:52:24 +0000 (16:52 +0100)]
Merge spice-gtk (0.33-3.3+deb9u1) import into refs/heads/workingbranch

7 years agoFix flexible array buffer overflow
Frediano Ziglio [Fri, 18 May 2018 10:41:57 +0000 (11:41 +0100)]
Fix flexible array buffer overflow

This is kind of a DoS, possibly flexible array in the protocol
causes the network size check to be ignored due to integer overflows.

The size of flexible array is computed as (message_end - position),
then this size is added to the number of bytes before the array and
this number is used to check if we overflow initial message.

An example is:

    message {
        uint32 dummy[2];
        uint8 data[] @end;
    } LenMessage;

which generated this (simplified remove useless code) code:

    { /* data */
        data__nelements = message_end - (start + 8);

        data__nw_size = data__nelements;
    }

    nw_size = 8 + data__nw_size;

    /* Check if message fits in reported side */
    if (nw_size > (uintptr_t) (message_end - start)) {
        return NULL;
    }

Following code:
- data__nelements == message_end - (start + 8)
- data__nw_size == data__nelements == message_end - (start + 8)
- nw_size == 8 + data__nw_size == 8 + message_end - (start + 8) ==
  8 + message_end - start - 8 == message_end -start
- the check for overflow is (nw_size > (message_end - start)) but
  nw_size == message_end - start so the check is doing
  ((message_end - start) > (message_end - start)) which is always false.

If message_end - start < 8 then data__nelements (number of element
on the array above) computation generate an integer underflow that
later create a buffer overflow.

Add a check to make sure that the array starts before the message ends
to avoid the overflow.

Signed-off-by: Frediano Ziglio <fziglio@redhat.com>
Signed-off-by: Christophe Fergeau <cfergeau@redhat.com>
[Salvatore Bonaccorso: Drop generated diff from commit messages causing
 problem when applying with quilt. Remove addition to testsuite]

Gbp-Pq: Name Fix-flexible-array-buffer-overflow.patch

7 years agossl: Use accessors rather than direct struct access
Sebastian Andrzej Siewior [Wed, 30 Nov 2016 15:34:59 +0000 (16:34 +0100)]
ssl: Use accessors rather than direct struct access

In OpenSSL 1.1.0, the struct fields are private so we can no longer
directly access them.

The accessors are not available in previous OpenSSL releases, so we need
to add compat helpers.

Gbp-Pq: Name ssl-Use-accessors-rather-than-direct-struct-access.patch

7 years agossl: Rework our custom BIO type
Sebastian Andrzej Siewior [Wed, 26 Oct 2016 15:31:27 +0000 (17:31 +0200)]
ssl: Rework our custom BIO type

This commit changes to an actual new BIO method rather than reusing an
existing BIO method, and overriding only the fields that we need.
The approach before this commit would be causing issues with OpenSSL
1.1.0 as some of the fields we access have become opaque.

Gbp-Pq: Name ssl-Rework-our-custom-BIO-type.patch

7 years agossl: Stop creating our own X509_LOOKUP_METHOD
Sebastian Andrzej Siewior [Wed, 26 Oct 2016 10:55:03 +0000 (12:55 +0200)]
ssl: Stop creating our own X509_LOOKUP_METHOD

OpenSSL 1.1.0 does not seem to provide API to do that anymore.

There is no need to create a custom lookup to begin with. This method
here has no callbacks implemented and is doing nothing. The way I
understand it, it is used to retrieve a `lookup' object which provides a
certificate store.  The SSL ctx provides also such a store.

Acked-by: Christophe Fergeau <cfergeau@redhat.com>
Acked-by: Pavel Grunt <pgrunt@redhat.com>
Gbp-Pq: Name ssl-Stop-creating-our-own-X509_LOOKUP_METHOD.patch

7 years agodebian_843471-clipboard_Fix_crash_by_handling_error
Liang Guo [Fri, 26 Oct 2018 15:52:24 +0000 (16:52 +0100)]
debian_843471-clipboard_Fix_crash_by_handling_error

commit 03c016bea939ee4a26e90d80fa1012a993a8ea47
Author: Victor Toso <me@victortoso.com>
Origin: upstream, https://cgit.freedesktop.org/spice/spice-gtk/commit/?id=03c016bea939ee4a26e90d80fa1012a993a8ea47
Bug-Debian: https://bugs.debian.org/843471
Date:   Fri Oct 14 18:12:01 2016 +0200

    clipboard: Fix crash by handling error

    As manual states below, text could be NULL for different reasons and
    we should handle that. I've included a debug message to help
    identifying possible regressions from wayland's clipboard.

    This crash is a regression from 7b0de6217670e0f668aff2949f

     "The text parameter to callback will contain the resulting text if
     the request succeeded, or NULL if it failed. This could happen for
     various reasons, in particular if the clipboard was empty or if the
     contents of the clipboard could not be converted into text form."

    Resolves: rhbz#1384676

Signed-off-by: Victor Toso <victortoso@redhat.com>
Acked-by: Pavel Grunt <pgrunt@redhat.com>
Gbp-Pq: Name debian_843471-clipboard_Fix_crash_by_handling_error.patch

7 years agoexplicitly-enable-subdir-objects
Liang Guo [Fri, 26 Oct 2018 15:52:24 +0000 (16:52 +0100)]
explicitly-enable-subdir-objects

When subdir source is included but subdir-objects is not
enabled, automake will throw a warning which will be considered
error by debian build system

Gbp-Pq: Name explicitly-enable-subdir-objects.patch

7 years agospice-gtk (0.33-3.3+deb9u1) stretch; urgency=medium
Salvatore Bonaccorso [Fri, 26 Oct 2018 15:52:24 +0000 (16:52 +0100)]
spice-gtk (0.33-3.3+deb9u1) stretch; urgency=medium

  * Non-maintainer upload.
  * Fix flexible array buffer overflow (CVE-2018-10873) (Closes: #906316)

[dgit import unpatched spice-gtk 0.33-3.3+deb9u1]

7 years agoImport spice-gtk_0.33-3.3+deb9u1.debian.tar.xz
Salvatore Bonaccorso [Fri, 26 Oct 2018 15:52:24 +0000 (16:52 +0100)]
Import spice-gtk_0.33-3.3+deb9u1.debian.tar.xz

[dgit import tarball spice-gtk 0.33-3.3+deb9u1 spice-gtk_0.33-3.3+deb9u1.debian.tar.xz]

9 years agoImport spice-gtk_0.33.orig.tar.bz2
Liang Guo [Fri, 7 Oct 2016 15:14:27 +0000 (16:14 +0100)]
Import spice-gtk_0.33.orig.tar.bz2

[dgit import orig spice-gtk_0.33.orig.tar.bz2]

9 years agoMerge spice-gtk (0.32-1+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Thu, 15 Sep 2016 13:21:14 +0000 (14:21 +0100)]
Merge spice-gtk (0.32-1+rpi1) import into refs/heads/workingbranch

9 years agoexplicitly-enable-subdir-objects
Liang Guo [Thu, 15 Sep 2016 13:21:14 +0000 (14:21 +0100)]
explicitly-enable-subdir-objects

When subdir source is included but subdir-objects is not
enabled, automake will throw a warning which will be considered
error by debian build system

Gbp-Pq: Name explicitly-enable-subdir-objects.patch

9 years agospice-gtk (0.32-1+rpi1) stretch-staging; urgency=medium
Peter Michael Green [Thu, 15 Sep 2016 13:21:14 +0000 (14:21 +0100)]
spice-gtk (0.32-1+rpi1) stretch-staging; urgency=medium

  * Add build-depends on libegl1-mesa-dev.

[dgit import unpatched spice-gtk 0.32-1+rpi1]

9 years agoImport spice-gtk_0.32-1+rpi1.debian.tar.xz
Peter Michael Green [Thu, 15 Sep 2016 13:21:14 +0000 (14:21 +0100)]
Import spice-gtk_0.32-1+rpi1.debian.tar.xz

[dgit import tarball spice-gtk 0.32-1+rpi1 spice-gtk_0.32-1+rpi1.debian.tar.xz]

9 years agoexplicitly-enable-subdir-objects
Liang Guo [Fri, 1 Jul 2016 11:32:58 +0000 (12:32 +0100)]
explicitly-enable-subdir-objects

When subdir source is included but subdir-objects is not
enabled, automake will throw a warning which will be considered
error by debian build system

Gbp-Pq: Name explicitly-enable-subdir-objects.patch

9 years agoImport spice-gtk_0.32.orig.tar.bz2
Liang Guo [Fri, 1 Jul 2016 11:32:58 +0000 (12:32 +0100)]
Import spice-gtk_0.32.orig.tar.bz2

[dgit import orig spice-gtk_0.32.orig.tar.bz2]

9 years agospice-gtk (0.32-1) unstable; urgency=medium
Liang Guo [Fri, 1 Jul 2016 11:32:58 +0000 (12:32 +0100)]
spice-gtk (0.32-1) unstable; urgency=medium

  * New upstream release
  * Update debian/copyright
  * debian/control:
    - Update Build-Depends libglib2.0-dev and libspice-protocol-dev
      version required
    - Remove Build-Depends on libgtk2.0-dev
    - Bump Standards-Version to 3.9.8 (no changes)
    - Use secure uri in vcs-*
  * Remove libspice-client-gtk-2.0-* and python-spice-client-gtk,
    upstream don't support gtk2 anymore
  * Refresh explicitly-enable-subdir-objects.patch
  * Bump SONAME and package name of libspice-client-gtk-3.0

[dgit import unpatched spice-gtk 0.32-1]

9 years agoImport spice-gtk_0.32-1.debian.tar.xz
Liang Guo [Fri, 1 Jul 2016 11:32:58 +0000 (12:32 +0100)]
Import spice-gtk_0.32-1.debian.tar.xz

[dgit import tarball spice-gtk 0.32-1 spice-gtk_0.32-1.debian.tar.xz]