X2Go Bug report logs - #955
x2gosid sanitizer check in x2gosqlitewrapper.pl / x2goserver- rpm for opensuse 13.2

version graph

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: Frank Knoben <admin@igpm.rwth-aachen.de>

Date: Wed, 7 Oct 2015 08:20:02 UTC

Severity: normal

Found in version

Full log

🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#955: x2gosid sanitizer check in x2gosqlitewrapper.pl / x2goserver- rpm for opensuse 13.2
Reply-To: Frank Knoben <admin@igpm.rwth-aachen.de>, 955@bugs.x2go.org
Resent-From: Frank Knoben <admin@igpm.rwth-aachen.de>
Original-Sender: frank@igpm.rwth-aachen.de
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Wed, 07 Oct 2015 08:20:02 +0000
Resent-Message-ID: <handler.955.B.144420583416477@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: report 955
X-X2Go-PR-Package: x2goserver
Received: via spool by submit@bugs.x2go.org id=B.144420583416477
          (code B); Wed, 07 Oct 2015 08:20:02 +0000
Received: (at submit) by bugs.x2go.org; 7 Oct 2015 08:17:14 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_50,URIBL_BLOCKED
	autolearn=ham version=3.3.2
Received: from mx-out-1.rwth-aachen.de (mx-out-1.rwth-aachen.de [])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 6B0783BC4A
	for <submit@bugs.x2go.org>; Wed,  7 Oct 2015 10:17:13 +0200 (CEST)
X-IronPort-AV: E=Sophos;i="5.17,648,1437429600"; 
Received: from igpm.igpm.rwth-aachen.de ([])
  by mx-1.rz.rwth-aachen.de with ESMTP; 07 Oct 2015 10:17:13 +0200
Received: from indy5.igpm.rwth-aachen.de ([])
	by igpm.igpm.rwth-aachen.de with esmtps (UNKNOWN:AES256-GCM-SHA384:256)
	(Exim 4.72)
	(envelope-from <frank@igpm.rwth-aachen.de>)
	id 1ZjjuS-00066h-IC
	for submit@bugs.x2go.org; Wed, 07 Oct 2015 10:17:12 +0200
Received: from lecorbusier.igpm.rwth-aachen.de ([])
	by indy5.igpm.rwth-aachen.de with esmtpsa (TLSv1.2:AES128-SHA:128)
	(Exim 4.84)
	(envelope-from <frank@igpm.rwth-aachen.de>)
	id 1ZjjuS-0008Bn-Tp
	for submit@bugs.x2go.org; Wed, 07 Oct 2015 10:17:13 +0200
To: submit@bugs.x2go.org
From: Frank Knoben <admin@igpm.rwth-aachen.de>
Message-ID: <5614D503.4050500@igpm.rwth-aachen.de>
Date: Wed, 7 Oct 2015 10:17:07 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: frank@igpm.rwth-aachen.de
Package: x2goserver

File: x2gosqlitewrapper.pl

Subroutine: sanitizer

Operating System: openSuSE 13.2 64bit


on my system, there are a lot of users, whose username consists of only 

In the latest x2goserver rpm for my opensuse 13.2 system 
there seem's to be something wrong with the sanitzer check function in 
For the users, whose username contains only numbers, I get the error 
message of a malformed session id.
When I don't do a sanitzer check on the x2gosid, everything is fine.
Unfortunately, I have not learned the perl programming language and I'm 
not so good with regular expression,
that I do know how to fix the problem correctly.
For me, I just put a

return $string;

after the

elsif ($type eq "x2gosid") {

and everything works fine for me again.


Frank Knoben

Send a report that this bug log contains spam.

X2Go Developers <owner@bugs.x2go.org>. Last modified: Sat May 25 14:53:16 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.