From unknown Sun May 24 17:45:52 2026
X-Loop: owner@bugs.x2go.org
Subject: Bug#1258: X2Go issue (in src:x2goclient) has been marked as closed
Reply-To: Mike DePaulo Mike DePaulo <mikedep333@gmail.com>, 1258@bugs.x2go.org
Resent-From: Mike DePaulo Mike DePaulo <mikedep333@gmail.com>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Thu, 01 Mar 2018 12:35:02 +0000
Resent-Message-ID: <handler.1258.B1258.151990744110076@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1258
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: pending
Received: via spool by 1258-submit@bugs.x2go.org id=B1258.151990744110076
          (code B ref 1258); Thu, 01 Mar 2018 12:35:02 +0000
Received: (at 1258) by bugs.x2go.org; 1 Mar 2018 12:30:41 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.0 required=3.0 tests=ALL_TRUSTED,BAYES_00,
	DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,URIBL_BLOCKED
	autolearn=no autolearn_force=no version=3.4.1
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 183F05DAEB;
	Thu,  1 Mar 2018 13:30:32 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id RmpnLkA5HdYq; Thu,  1 Mar 2018 13:30:16 +0100 (CET)
Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005)
	id BD2F25DAE9; Thu,  1 Mar 2018 13:30:16 +0100 (CET)
From: Mike DePaulo Mike DePaulo <mikedep333@gmail.com>
To: 1258-submitter@bugs.x2go.org
Cc: control@bugs.x2go.org, 1258@bugs.x2go.org
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Message-Id: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de>
Date: Thu,  1 Mar 2018 13:30:16 +0100 (CET)

close #1258
thanks

Hello,

we are very hopeful that X2Go issue #1258 reported by you
has been resolved in the new release (4.1.1.1) of the
X2Go source project »src:x2goclient«.

You can view the complete changelog entry of src:x2goclient (4.1.1.1)
below, and you can use the following link to view all the code changes
between this and the last release of src:x2goclient.

    http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=b4421bf6fc16d46e68dde8a0b9d48252804a30f1;hp=d8f5e5a4a51724ef3620e7f347644338e2449444

If you feel that the issue has not been resolved satisfyingly, feel
free to reopen this bug report or submit a follow-up report with
further observations described based on the new released version
of src:x2goclient.

Thanks a lot for contributing to X2Go!!!

light+love
X2Go Git Admin (on behalf of the sender of this mail)

---
X2Go Component: src:x2goclient
Version: 4.1.1.1-2018.03.01
Status: RELEASE
Date: Wed, 28 Feb 2018 20:53:41 -0500
Fixes: 1258
Changes:
 x2goclient (4.1.1.1-2018.03.01) RELEASED; urgency=medium
 .
   [ Mike DePaulo ]
   * New upstream version (4.1.1.1-2018.03.01):
     - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with
       SSH Server (e.g. for changing expired password) when using
       GSSAPI/Kerberos because the interaction code does not support it yet.
       Fixes: #1258
     - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns
       vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3.
       Note that x2goclient was only ever affected if the permissions on the
       installation folder were changed to give users write access, or if
       x2goclient was copied/extracted to a folder where users could write.
