From unknown Fri Mar 29 13:15:18 2024 X-Loop: owner@bugs.x2go.org Subject: Bug#1258: X2Go issue (in src:x2goclient) has been marked as closed Reply-To: Mike DePaulo Mike DePaulo , 1258@bugs.x2go.org Resent-From: Mike DePaulo Mike DePaulo Resent-To: x2go-dev@lists.x2go.org Resent-CC: X2Go Developers X-Loop: owner@bugs.x2go.org Resent-Date: Thu, 01 Mar 2018 12:35:02 +0000 Resent-Message-ID: Resent-Sender: owner@bugs.x2go.org X-X2Go-PR-Message: followup 1258 X-X2Go-PR-Package: x2goclient X-X2Go-PR-Keywords: pending Received: via spool by 1258-submit@bugs.x2go.org id=B1258.151990744110076 (code B ref 1258); Thu, 01 Mar 2018 12:35:02 +0000 Received: (at 1258) by bugs.x2go.org; 1 Mar 2018 12:30:41 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=3.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.1 Received: from localhost (localhost [127.0.0.1]) by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 183F05DAEB; Thu, 1 Mar 2018 13:30:32 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de Received: from ymir.das-netzwerkteam.de ([127.0.0.1]) by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmpnLkA5HdYq; Thu, 1 Mar 2018 13:30:16 +0100 (CET) Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005) id BD2F25DAE9; Thu, 1 Mar 2018 13:30:16 +0100 (CET) From: Mike DePaulo Mike DePaulo To: 1258-submitter@bugs.x2go.org Cc: control@bugs.x2go.org, 1258@bugs.x2go.org Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Message-Id: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de> Date: Thu, 1 Mar 2018 13:30:16 +0100 (CET) close #1258 thanks Hello, we are very hopeful that X2Go issue #1258 reported by you has been resolved in the new release (4.1.1.1) of the X2Go source project »src:x2goclient«. You can view the complete changelog entry of src:x2goclient (4.1.1.1) below, and you can use the following link to view all the code changes between this and the last release of src:x2goclient. http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=b4421bf6fc16d46e68dde8a0b9d48252804a30f1;hp=d8f5e5a4a51724ef3620e7f347644338e2449444 If you feel that the issue has not been resolved satisfyingly, feel free to reopen this bug report or submit a follow-up report with further observations described based on the new released version of src:x2goclient. Thanks a lot for contributing to X2Go!!! light+love X2Go Git Admin (on behalf of the sender of this mail) --- X2Go Component: src:x2goclient Version: 4.1.1.1-2018.03.01 Status: RELEASE Date: Wed, 28 Feb 2018 20:53:41 -0500 Fixes: 1258 Changes: x2goclient (4.1.1.1-2018.03.01) RELEASED; urgency=medium . [ Mike DePaulo ] * New upstream version (4.1.1.1-2018.03.01): - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with SSH Server (e.g. for changing expired password) when using GSSAPI/Kerberos because the interaction code does not support it yet. Fixes: #1258 - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3. Note that x2goclient was only ever affected if the permissions on the installation folder were changed to give users write access, or if x2goclient was copied/extracted to a folder where users could write.