similar to: [Bug 1082] xauth list invocation has bogus "." argument

Displaying 20 results from an estimated 4000 matches similar to: "[Bug 1082] xauth list invocation has bogus "." argument"

2018 Apr 27
4
[PATCH] allow indefinite ForwardX11Timeout by setting it to 0
This change allows use of untrusted X11 forwarding (which is more secure) without requiring users to choose a finite timeout after which to refuse new connections. This matches the semantics of the X11 security extension itself, which also treat a validity timeout of 0 on an authentication cookie as indefinite. Signed-off-by: Trixie Able <table at inventati.org> --- clientloop.c | 12
2005 Oct 07
5
[Bug 1098] $MAIL being set incorrectly for HPUX server login
http://bugzilla.mindrot.org/show_bug.cgi?id=1098 Summary: $MAIL being set incorrectly for HPUX server login Product: Portable OpenSSH Version: 4.2p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org ReportedBy:
2005 Sep 29
3
[Bug 1096] ssh-keygen broken on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=1096 Summary: ssh-keygen broken on HPUX Product: Portable OpenSSH Version: 4.2p1 Platform: HPPA OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: ssh-keygen AssignedTo: bitbucket at mindrot.org ReportedBy: o.flebbe at
2005 Dec 19
2
[Bug 1137] ssh does not always return code 255 when in error
http://bugzilla.mindrot.org/show_bug.cgi?id=1137 Summary: ssh does not always return code 255 when in error Product: Portable OpenSSH Version: 4.2p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: ombugr
2005 Oct 26
4
[Bug 1106] Updated .spec file and startup for SuSE
http://bugzilla.mindrot.org/show_bug.cgi?id=1106 Summary: Updated .spec file and startup for SuSE Product: Portable OpenSSH Version: 4.2p1 Platform: All OS/Version: Linux Status: NEW Severity: enhancement Priority: P2 Component: Build system AssignedTo: bitbucket at mindrot.org ReportedBy:
2005 Nov 21
5
[Bug 1122] __USE_GNU is internal glibc macro and should not be used
http://bugzilla.mindrot.org/show_bug.cgi?id=1122 Summary: __USE_GNU is internal glibc macro and should not be used Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Miscellaneous AssignedTo: bitbucket at mindrot.org
2005 Nov 17
4
[Bug 1119] Enhancement request for raising minimum acceptable key length.
http://bugzilla.mindrot.org/show_bug.cgi?id=1119 Summary: Enhancement request for raising minimum acceptable key length. Product: Portable OpenSSH Version: 4.2p1 Platform: Other URL: http://www.rsasecurity.com/press_release.asp?doc_id=488& id=1034 OS/Version: All Status: NEW
2005 Oct 14
11
[Bug 1104] Compile error "ldLL" not declared in strtonum.c under Tru64 Unix 4.0f
http://bugzilla.mindrot.org/show_bug.cgi?id=1104 Summary: Compile error "ldLL" not declared in strtonum.c under Tru64 Unix 4.0f Product: Portable OpenSSH Version: 4.2p1 Platform: Alpha OS/Version: OSF/1 Status: NEW Severity: critical Priority: P2 Component: Build system
2006 Feb 13
3
[Bug 975] Kerberos authentication timing can leak information about account validity
http://bugzilla.mindrot.org/show_bug.cgi?id=975 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- OtherBugsDependingO| |1155 nThis| | ------- You are receiving this mail because: ------- You are the assignee for
2006 Feb 09
8
[Bug 440] Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2006-02-09 15:51 MET ------- In the DCC Specifcication
2017 Jan 29
0
[ANNOUNCE] xauth 1.0.10
Alan Coopersmith (2): include POSIX-standard limits.h for PATH_MAX instead of sys/syslimits.h autogen.sh: Honor NOCONFIGURE=1 Dr. Tilmann Bubeck (2): Clarified RELEASING in README Fix for xauth failing on ENOSPC (= disk full) Emil Velikov (1): autogen.sh: use quoted string variables Jeremy Huddleston Sequoia (1): Update DISPLAY parsing to work with new
2019 Jul 11
0
[ANNOUNCE] xauth 1.1
This release fixes a race condition where an existing authority file would be unlinked (possibly causing other clients to fail to connect), and fixes sorting and merging of authority file entries. Adam Jackson (2): process: Close a window where no authority file would exist xauth 1.1 Alan Coopersmith (3): Change fall through comment in process.c to match gcc's requirements
1999 Dec 09
0
xauth location in openssh-1.2pre17
The current configuration only works if xauth can be found at /usr/X11R6/bin/xauth, which creates some problems when running sshd on an openwin system. Contained below are patches to find the path of xauth in configure, and set the path in config.h. (also contained is a patch for configure for those without autoconf) Also-- added #include "bsd-daemon" to includes.h, which quiets a
2008 Mar 06
0
[ANNOUNCE] xauth 1.0.3
Adam Jackson (1): xauth 1.0.3 Daniel Drake (1): Bug #10971: xauth COPYING file Jeremy Huddleston (2): Added support for launchd socket get_address_info: don't allow duplicate entries to be returned in the list git tag: xauth-1.0.3 http://xorg.freedesktop.org/archive/individual/app/xauth-1.0.3.tar.bz2 MD5: e91e10ace1df0d5f2cbc74ead256407a xauth-1.0.3.tar.bz2 SHA1:
2016 Mar 10
0
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv This document may be found at: http://www.openssh.com/txt/x11fwd.adv 1. Affected configurations All versions of OpenSSH prior to 7.2p2 with X11Forwarding enabled. 2. Vulnerability Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding to inject commands to xauth(1). Injection of xauth
2006 Dec 12
0
[ANNOUNCE] xauth 1.0.2
Manpage typo fix & minor cleanups, autoconf/make updates. This release is targeted for 7.2. http://xorg.freedesktop.org/releases/individual/app/xauth-1.0.2.tar.bz2 http://xorg.freedesktop.org/releases/individual/app/xauth-1.0.2.tar.gz git tag: xauth-1.0.2 md5 (xauth-1.0.2.tar.bz2) = 31b956edaeb453ddaa640420e97b25b2 md5 (xauth-1.0.2.tar.gz) = 5165d33891addd8e511e35876953b261 sha1
2007 Jul 05
0
tripwire / .xauth$$$$ problem on Centos5
Dear All, I'm using Centos5 to run a firewall, and as part of the intrusion detection apparatus, I use tripwire (tripwire-2.4.1.1-1.fc6.x86_64.rpm - as made for fedora core 6, and then tweaked with my own twpol.txt). My problem, is that when I su to root, a .xauth file is created with a random tail name - i.e. /root/.xauthyN4aHS or /root/.xauth1sGdFh and this causes tripwire to
2016 Mar 10
2
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv This document may be found at: http://www.openssh.com/txt/x11fwd.adv 1. Affected configurations All versions of OpenSSH prior to 7.2p2 with X11Forwarding enabled. 2. Vulnerability Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding to inject commands to xauth(1). Injection of xauth
2017 Oct 13
2
X11forwarding yes: how to debug/setup after xauth fix
On 13/10/2017 15:29, Michael Felt wrote: > This verifies it is xauth related: > > debug3: sending debug message: No xauth program; cannot forward with > spoofing. > > so, added an extra debug - and this is what I see: > > debug1: session_input_channel_req: session 0 req x11-req > debug3: setup_x11fwd: xauth_location == /usr/X11R6/bin/xauth > debug3: sending debug
2005 Nov 05
2
[Bug 1112] __dead conflicts with sys/cdefs.h on Interix
http://bugzilla.mindrot.org/show_bug.cgi?id=1112 Summary: __dead conflicts with sys/cdefs.h on Interix Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: Build system AssignedTo: bitbucket at mindrot.org ReportedBy: