Displaying 20 results from an estimated 4000 matches similar to: "[Bug 1082] xauth list invocation has bogus "." argument"
2018 Apr 27
4
[PATCH] allow indefinite ForwardX11Timeout by setting it to 0
This change allows use of untrusted X11 forwarding (which is more
secure) without
requiring users to choose a finite timeout after which to refuse new
connections.
This matches the semantics of the X11 security extension itself, which
also treat a
validity timeout of 0 on an authentication cookie as indefinite.
Signed-off-by: Trixie Able <table at inventati.org>
---
clientloop.c | 12
2005 Oct 07
5
[Bug 1098] $MAIL being set incorrectly for HPUX server login
http://bugzilla.mindrot.org/show_bug.cgi?id=1098
Summary: $MAIL being set incorrectly for HPUX server login
Product: Portable OpenSSH
Version: 4.2p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2005 Sep 29
3
[Bug 1096] ssh-keygen broken on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=1096
Summary: ssh-keygen broken on HPUX
Product: Portable OpenSSH
Version: 4.2p1
Platform: HPPA
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh-keygen
AssignedTo: bitbucket at mindrot.org
ReportedBy: o.flebbe at
2005 Dec 19
2
[Bug 1137] ssh does not always return code 255 when in error
http://bugzilla.mindrot.org/show_bug.cgi?id=1137
Summary: ssh does not always return code 255 when in error
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: ombugr
2005 Oct 26
4
[Bug 1106] Updated .spec file and startup for SuSE
http://bugzilla.mindrot.org/show_bug.cgi?id=1106
Summary: Updated .spec file and startup for SuSE
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: Build system
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2005 Nov 21
5
[Bug 1122] __USE_GNU is internal glibc macro and should not be used
http://bugzilla.mindrot.org/show_bug.cgi?id=1122
Summary: __USE_GNU is internal glibc macro and should not be used
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: bitbucket at mindrot.org
2005 Nov 17
4
[Bug 1119] Enhancement request for raising minimum acceptable key length.
http://bugzilla.mindrot.org/show_bug.cgi?id=1119
Summary: Enhancement request for raising minimum acceptable key
length.
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
URL: http://www.rsasecurity.com/press_release.asp?doc_id=488&
id=1034
OS/Version: All
Status: NEW
2005 Oct 14
11
[Bug 1104] Compile error "ldLL" not declared in strtonum.c under Tru64 Unix 4.0f
http://bugzilla.mindrot.org/show_bug.cgi?id=1104
Summary: Compile error "ldLL" not declared in strtonum.c under
Tru64 Unix 4.0f
Product: Portable OpenSSH
Version: 4.2p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: critical
Priority: P2
Component: Build system
2006 Feb 13
3
[Bug 975] Kerberos authentication timing can leak information about account validity
http://bugzilla.mindrot.org/show_bug.cgi?id=975
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
OtherBugsDependingO| |1155
nThis| |
------- You are receiving this mail because: -------
You are the assignee for
2006 Feb 09
8
[Bug 440] Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From laforge@netfilter.org 2006-02-09 15:51 MET -------
In the DCC Specifcication
2017 Jan 29
0
[ANNOUNCE] xauth 1.0.10
Alan Coopersmith (2):
include POSIX-standard limits.h for PATH_MAX instead of sys/syslimits.h
autogen.sh: Honor NOCONFIGURE=1
Dr. Tilmann Bubeck (2):
Clarified RELEASING in README
Fix for xauth failing on ENOSPC (= disk full)
Emil Velikov (1):
autogen.sh: use quoted string variables
Jeremy Huddleston Sequoia (1):
Update DISPLAY parsing to work with new
2019 Jul 11
0
[ANNOUNCE] xauth 1.1
This release fixes a race condition where an existing authority file
would be unlinked (possibly causing other clients to fail to connect), and fixes sorting and merging of authority file entries.
Adam Jackson (2):
process: Close a window where no authority file would exist
xauth 1.1
Alan Coopersmith (3):
Change fall through comment in process.c to match gcc's requirements
1999 Dec 09
0
xauth location in openssh-1.2pre17
The current configuration only works if xauth can be
found at /usr/X11R6/bin/xauth, which creates some problems
when running sshd on an openwin system.
Contained below are patches to find the path of xauth in configure,
and set the path in config.h. (also contained is a patch for
configure for those without autoconf)
Also-- added #include "bsd-daemon" to includes.h, which quiets a
2008 Mar 06
0
[ANNOUNCE] xauth 1.0.3
Adam Jackson (1):
xauth 1.0.3
Daniel Drake (1):
Bug #10971: xauth COPYING file
Jeremy Huddleston (2):
Added support for launchd socket
get_address_info: don't allow duplicate entries to be returned in the list
git tag: xauth-1.0.3
http://xorg.freedesktop.org/archive/individual/app/xauth-1.0.3.tar.bz2
MD5: e91e10ace1df0d5f2cbc74ead256407a xauth-1.0.3.tar.bz2
SHA1:
2016 Mar 10
0
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
All versions of OpenSSH prior to 7.2p2 with X11Forwarding
enabled.
2. Vulnerability
Missing sanitisation of untrusted input allows an
authenticated user who is able to request X11 forwarding
to inject commands to xauth(1).
Injection of xauth
2006 Dec 12
0
[ANNOUNCE] xauth 1.0.2
Manpage typo fix & minor cleanups, autoconf/make updates.
This release is targeted for 7.2.
http://xorg.freedesktop.org/releases/individual/app/xauth-1.0.2.tar.bz2
http://xorg.freedesktop.org/releases/individual/app/xauth-1.0.2.tar.gz
git tag: xauth-1.0.2
md5 (xauth-1.0.2.tar.bz2) = 31b956edaeb453ddaa640420e97b25b2
md5 (xauth-1.0.2.tar.gz) = 5165d33891addd8e511e35876953b261
sha1
2007 Jul 05
0
tripwire / .xauth$$$$ problem on Centos5
Dear All,
I'm using Centos5 to run a firewall, and as part of the intrusion detection
apparatus, I use tripwire (tripwire-2.4.1.1-1.fc6.x86_64.rpm - as made for
fedora core 6, and then tweaked with my own twpol.txt).
My problem, is that when I su to root, a .xauth file is created with a random
tail name - i.e. /root/.xauthyN4aHS or /root/.xauth1sGdFh and this causes
tripwire to
2016 Mar 10
2
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
All versions of OpenSSH prior to 7.2p2 with X11Forwarding
enabled.
2. Vulnerability
Missing sanitisation of untrusted input allows an
authenticated user who is able to request X11 forwarding
to inject commands to xauth(1).
Injection of xauth
2017 Oct 13
2
X11forwarding yes: how to debug/setup after xauth fix
On 13/10/2017 15:29, Michael Felt wrote:
> This verifies it is xauth related:
>
> debug3: sending debug message: No xauth program; cannot forward with
> spoofing.
>
> so, added an extra debug - and this is what I see:
>
> debug1: session_input_channel_req: session 0 req x11-req
> debug3: setup_x11fwd: xauth_location == /usr/X11R6/bin/xauth
> debug3: sending debug
2005 Nov 05
2
[Bug 1112] __dead conflicts with sys/cdefs.h on Interix
http://bugzilla.mindrot.org/show_bug.cgi?id=1112
Summary: __dead conflicts with sys/cdefs.h on Interix
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: bitbucket at mindrot.org
ReportedBy: