Displaying 20 results from an estimated 40000 matches similar to: "[Bug 1453] New: sshd closes connections."
2008 Apr 03
4
[Bug 1456] New: Can't find openbsd43_5.0.patch (OpenSSL 5.0)
https://bugzilla.mindrot.org/show_bug.cgi?id=1456
Summary: Can't find openbsd43_5.0.patch (OpenSSL 5.0)
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: amd64
2011 Apr 15
11
[Bug 1891] New: selinux policy does not like to exec passwd from sshd directly
https://bugzilla.mindrot.org/show_bug.cgi?id=1891
Summary: selinux policy does not like to exec passwd from sshd
directly
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2007 May 21
10
[Bug 1316] New: Add LDAP support to sshd
http://bugzilla.mindrot.org/show_bug.cgi?id=1316
Summary: Add LDAP support to sshd
Product: Portable OpenSSH
Version: 4.6p1
Platform: All
URL: http://dev.inversepath.com/trac/openssh-lpk
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: PAM support
AssignedTo:
2009 Aug 05
11
[Bug 1628] New: /var/run/sshd.pid file collisions...
https://bugzilla.mindrot.org/show_bug.cgi?id=1628
Summary: /var/run/sshd.pid file collisions...
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: unassigned-bugs at mindrot.org
2008 Jan 28
10
[Bug 1433] New: sshd.pid has permissions of 666
https://bugzilla.mindrot.org/show_bug.cgi?id=1433
Summary: sshd.pid has permissions of 666
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2008 May 22
6
[Bug 1468] New: sshd does not log failed attempts using key-based authentication only
https://bugzilla.mindrot.org/show_bug.cgi?id=1468
Summary: sshd does not log failed attempts using key-based
authentication only
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: security
Priority: P2
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
Summary: sshd -T reports a string of UNKNOWNs
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
Summary: sshd -T reports a string of UNKNOWNs
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at
2009 Oct 26
6
[Bug 1666] New: sshd throws "Invalid user" for existing users sometimes
https://bugzilla.mindrot.org/show_bug.cgi?id=1666
Summary: sshd throws "Invalid user" for existing users
sometimes
Product: Portable OpenSSH
Version: 4.2p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo:
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
http://bugzilla.mindrot.org/show_bug.cgi?id=1363
Summary: sshd gets stuck: select() in packet_read_seqnr waits
indefinitely
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
URL: http://marc.info/?t=117394251600035
OS/Version: All
Status: NEW
Keywords: patch
Severity: major
2008 May 25
19
[Bug 1470] New: adjust Linux out-of-memory killer to stop sshd being killed
https://bugzilla.mindrot.org/show_bug.cgi?id=1470
Summary: adjust Linux out-of-memory killer to stop sshd being
killed
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=34176
7
OS/Version: Linux
2011 Dec 13
5
[Bug 1960] New: Running sshd in wrong SELinux context causes segmentation fault when a user logs in
https://bugzilla.mindrot.org/show_bug.cgi?id=1960
Bug #: 1960
Summary: Running sshd in wrong SELinux context causes
segmentation fault when a user logs in
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p1
Platform: amd64
OS/Version: Linux
Status: NEW
Severity: minor
2009 Apr 02
6
[Bug 1584] New: umask setting in sshd
https://bugzilla.mindrot.org/show_bug.cgi?id=1584
Summary: umask setting in sshd
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: leo.baltus at omroep.nl
2007 Oct 03
4
[Bug 1372] New: sshd(8) and ssh-keygen(1) refer to non-existent moduli(5)
http://bugzilla.mindrot.org/show_bug.cgi?id=1372
Summary: sshd(8) and ssh-keygen(1) refer to non-existent
moduli(5)
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: bitbucket at
2011 Feb 16
4
[Bug 1859] New: sshd does not forward break request to process as SIGINT
https://bugzilla.mindrot.org/show_bug.cgi?id=1859
Summary: sshd does not forward break request to process as
SIGINT
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at
2008 May 26
4
[Bug 1471] New: sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471
Summary: sshd can block if authorized_keys is a named pipe
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: bitbucket at
2008 Jul 12
2
[Bug 1487] New: Race condition between monitor and unprivileged child in sshd
https://bugzilla.mindrot.org/show_bug.cgi?id=1487
Summary: Race condition between monitor and unprivileged child
in sshd
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2009 Apr 01
3
[Bug 1582] New: memory leak in do_ssh2_kex() routine (sshd.c)
https://bugzilla.mindrot.org/show_bug.cgi?id=1582
Summary: memory leak in do_ssh2_kex() routine (sshd.c)
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2007 Oct 07
4
[Bug 1374] New: sshd -D produces zombies if authentication is interrupted
http://bugzilla.mindrot.org/show_bug.cgi?id=1374
Summary: sshd -D produces zombies if authentication is
interrupted
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at
2007 May 17
4
[Bug 1306] Spurious : "chan_read_failed for istate 3" errors from sshd
http://bugzilla.mindrot.org/show_bug.cgi?id=1306
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1281| |ok?
Flag| |
--- Comment #7 from Damien Miller <djm at