From unknown Sat May 02 16:24:19 2026
X-Loop: owner@bugs.x2go.org
Subject: Bug#1258: X2Go issue (in src:x2goclient) has been marked as pending for release
Reply-To: Mike DePaulo <mikedep333@gmail.com>, 1258-quiet@bugs.x2go.org
Resent-To: Mike DePaulo <mikedep333@gmail.com>
X-Loop: owner@bugs.x2go.org
Resent-Date: Mon, 19 Feb 2018 04:35:04 +0000
Resent-Message-ID: <handler.1258.U1258.151901477725916@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: report 1258
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: pending
Received: via spool by 1258-submitter@bugs.x2go.org id=U1258.151901477725916
          (code U ref 1258); Mon, 19 Feb 2018 04:35:04 +0000
Received: (at 1258-submitter) by bugs.x2go.org; 19 Feb 2018 04:32:57 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.0 required=3.0 tests=ALL_TRUSTED,BAYES_00,
	DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,URIBL_BLOCKED
	autolearn=no autolearn_force=no version=3.4.1
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id A08CA5DAEC;
	Mon, 19 Feb 2018 05:32:48 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id OjZnQzOzBbit; Mon, 19 Feb 2018 05:32:43 +0100 (CET)
Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005)
	id 60AB15DAEA; Mon, 19 Feb 2018 05:32:43 +0100 (CET)
From: Mike DePaulo <mikedep333@gmail.com>
To: 1258-submitter@bugs.x2go.org
Cc: control@bugs.x2go.org, 1258@bugs.x2go.org
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-Mailer: http://snipr.com/post-receive-tag-pending
Message-Id: <20180219043243.60AB15DAEA@ymir.das-netzwerkteam.de>
Date: Mon, 19 Feb 2018 05:32:43 +0100 (CET)

tag #1258 pending
fixed #1258 4.1.1.2
thanks

Hello,

X2Go issue #1258 (src:x2goclient) reported by you has been
fixed in X2Go Git. You can see the changelog below, and you can
check the diff of the fix at:

    http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=36cad1d

The issue will most likely be fixed in src:x2goclient (4.1.1.2).

light+love
X2Go Git Admin (on behalf of the sender of this mail)

---
commit 36cad1de8183b90d66acfe6673474a75e488d852
Author: Mike DePaulo <mikedep333@gmail.com>
Date:   Sun Feb 18 23:34:31 2018 -0500

    Update debian/changelog that commit "Do not attempt to perform Interaction with SSH Server" Fixes: #1258

diff --git a/debian/changelog b/debian/changelog
index a0d78f4..2d72061 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -5,6 +5,7 @@ x2goclient (4.1.1.2-0x2go1) UNRELEASED; urgency=medium
     - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with
       SSH Server (e.g. for changing expired password) when using
       GSSAPI/Kerberos because the interaction code does not support it yet.
+      Fixes: #1258
     - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns
       vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3.
       Note that x2goclient was only ever affected if the permissions on the
