Commit Graph

3757 Commits

Author SHA1 Message Date
matt335672
61b9a42fc5 Fixed compiler warnings about snprintf truncations 2020-09-02 10:32:38 +01:00
metalefty
8822771169
Merge pull request #1662 from aquesnel/fix_chunk_assembly
Adding checks to prevent buffer overruns during data chunk re-assembly
2020-09-01 08:37:11 +09:00
metalefty
1469d659db
Merge pull request #1671 from metalefty/release
Bump version to v0.9.14
2020-08-31 15:02:51 +09:00
Koichiro IWAO
9ec6162a54
bump version to v0.9.14 2020-08-31 14:24:54 +09:00
Koichiro IWAO
b4ca302c05
Update NEWS for v0.9.14 2020-08-31 14:15:12 +09:00
Bolke de Bruin
a6a0e5e004 Allow domain name to be concatenated to username
If a server is multihomed (i.e. mutiple domains) the
users are identified by their domain name. This change
allows to concat the domain name to the username with
a specific separator.
2020-08-30 21:56:16 +02:00
Bolke de Bruin
b0bca1363e Add support for token authentication
This feature allows to embed a token in the username field. Tokens
are separated from the username by the ASCII field separator character
0x1F (unicode 0x001F).
2020-08-29 10:40:22 +02:00
Koichiro IWAO
d364e76ae8 Update NEWS for v0.9.13.1 2020-08-28 10:52:15 +09:00
metalefty
5dd0bb6cac
Merge pull request #1663 from RolKau/1663-dvp
Detect and setup Programmer Dvorak keyboard layout
2020-08-28 10:51:39 +09:00
Roland Kaufmann
a9eb5a17d2 Detect and setup Programmer Dvorak keyboard layout
This patch will add the keyboard layout identifier for the Programmer
Dvorak keyboard layout, so that if a Windows client has that layout
active, it will be mapped to the corresponding xkeyboard-config layout
in the X server.

An XFreeRDP client knows about this layout too, and will correspondingly
map it to the identifier given here, making the layout propagate
correctly through X-to-X connections as well.

To replicate the full Windows keyboard layout several options have to
be set as well as the main layout. To avoid having these options spill
over to other layouts that are dumped, the old settings are stored
before the dump and then restored afterwards.
2020-08-26 17:55:25 +02:00
matt335672
5835aefa1f
Merge pull request #1664 from matt335672/sesman-ini-comment-fix
Updated sesman.ini comment for Policy= in line with the manpage
2020-08-26 10:30:48 +01:00
matt335672
8bd7309d72 Updated sesman.ini comment for Policy= in line with the manpage 2020-08-26 10:04:33 +01:00
metalefty
76ac0600e4
Merge pull request #1653 from bolkedebruin/devel
Fix buffer len for client info
2020-08-24 13:15:01 +09:00
Alexandre Quesnel
33d9e1d5d7 Adding checks to prevent buffer overruns during data chunk re-assembly 2020-08-24 00:03:08 +00:00
Bolke de Bruin
e89f124afe Ensure copying of the whole username/password 2020-08-21 14:29:01 +02:00
Bolke de Bruin
4d7b916faf Improve description 2020-08-21 09:19:49 +02:00
Bolke de Bruin
47e1c5d359 Add description 2020-08-19 12:50:01 +02:00
bolkedebruin
5cd36c511c Set max character buffer len to 512 per MS specification
The MS specs determine that the character buffer lenngths
for usernames, domains, passwords, alternate shells, etc
can be up to 512 characters including the mandatory null
terminator.
2020-08-17 10:35:35 +02:00
metalefty
f3e42fc209
Merge pull request #1640 from aquesnel/build_debug_werror
Fixing the build with --enable-xrdpdebug and CFLAGS=-Werror -Wall
2020-08-11 14:01:52 +09:00
metalefty
5da9d70317
Merge pull request #1645 from aquesnel/compile_faq
Adding an FAQ entry for configuring Travis CI and Cirrus CI for a fork
2020-08-07 21:58:26 +09:00
metalefty
33ebd639b5
Merge pull request #1647 from metalefty/sesman
sesman.ini: Update Xorg path for CentOS 8
2020-08-03 13:49:16 +09:00
Koichiro IWAO
00dca40bf8
sesman.ini: Update Xorg path for CentOS 8
Closes #1646.
2020-08-03 10:39:04 +09:00
Alexandre Quesnel
b2fea42acf Adding an FAQ entry for configuring Travis CI and Cirrus CI for a fork 2020-08-01 04:32:29 +00:00
Alexandre Quesnel
7e58209b19 Fixing the build with --enable-xrdpdebug and CFLAGS=-Werror -Wall 2020-07-25 23:53:26 +00:00
metalefty
396b8ce890
Merge pull request #1623 from matt335672/travis-ci-errs
Fixed CVE-2020-4044 CI errors
2020-06-29 22:58:51 +09:00
matt335672
7384f6e574 Fixed CVE-2020-4044 CI errors 2020-06-29 11:38:24 +01:00
metalefty
0c791d073d
Merge pull request from GHSA-j9fv-6fwf-p3g4
Fix for CVE-2020-4044
2020-06-26 20:09:03 +09:00
matt335672
e593f58a82 Fix for CVE-2020-4044
Reported by: Ashley Newson
2020-06-26 20:06:02 +09:00
metalefty
dda748de8a
Merge pull request #1619 from neutrinolabs/security-policy
Create SECURITY.md
2020-06-25 17:48:52 +09:00
metalefty
0505d28138
Create SECURITY.md 2020-06-25 17:18:15 +09:00
metalefty
e679890083
Merge pull request #1613 from matt335672/cppcheck-2-1
Cppcheck 2.1
2020-06-22 20:42:57 +09:00
matt335672
27653f97f2 Code changes for cppcheck 2.1 warnings 2020-06-19 11:07:23 +01:00
matt335672
a57c68f55e Implement changes to support cppcheck 2.x 2020-06-19 11:06:41 +01:00
matt335672
3de8550f40
Merge pull request #1611 from matt335672/minor-man-fixes
Minor manpage fixes
2020-06-18 13:36:01 +01:00
matt335672
a2ca01fdf5 Minor manpage fixes 2020-06-18 12:23:32 +01:00
matt335672
f37d1ba46e
Merge pull request #1343 from matt335672/extended-vnc
Add resizeable backend VNC support
2020-06-04 15:36:00 +01:00
matt335672
3c4b42b1aa Implemented resize and multimon support for VNC backend 2020-06-04 15:10:35 +01:00
matt335672
1c99d0a366
Merge pull request #1595 from matt335672/reset-improvements
Prevent chansrv input channels being scanned during a server reset
2020-06-03 12:15:07 +01:00
matt335672
81e037e964 Prevent chansrv input channels being scanned during a server reset 2020-06-03 11:57:25 +01:00
matt335672
358f07d1c7
Merge pull request #1593 from matt335672/issue1569
Ignore TS_MULTIFRAGMENTUPDATE_CAPABILITYSET from client if fp disabled
2020-05-27 08:03:00 +01:00
matt335672
bfffc40cba Ignore TS_MULTIFRAGMENTUPDATE_CAPABILITYSET from client if fp disabled 2020-05-26 12:02:11 +01:00
metalefty
a618a67d4a
Merge pull request #1520 from qarmin/small_fixes
Small fixes found by static analyzers.
2020-05-08 15:27:18 +09:00
metalefty
cc384de392
Merge pull request #1549 from matt335672/hac425-1
Address possible memory out-of-bounds accesses on connect requests
2020-05-08 15:17:55 +09:00
metalefty
30248303a8
Merge pull request #1557 from matt335672/hac425-2
Check for overflow before g_malloc() calls
2020-05-05 02:49:57 +09:00
metalefty
2e9e7bae75
Merge pull request #1560 from matt335672/slack-support
Support Slackware with pam
2020-04-28 09:26:53 +09:00
matt335672
aa0dbbae15 Added CHANNEL_NAME_LEN to ms-rdpbcgr.h 2020-04-27 15:01:56 +01:00
matt335672
2ec9720612 mkpamrules now supports Slackware 2020-04-26 17:27:19 +01:00
matt335672
617283eb34 Remove unnecessary g_malloc() call 2020-04-24 11:27:36 +01:00
matt335672
7ef01f7b0c Address memory allocation overflow security issues 2020-04-23 17:29:06 +01:00
metalefty
21a4118c0b
Merge pull request #1522 from okhowang/odd-shift
workaround odd shift behaviour
2020-04-21 11:40:38 +09:00