Displaying 20 results from an estimated 1000 matches similar to: "[Bug 3708] New: Tracking bug for OpenSSH 9.9"
2024 Mar 25
18
[Bug 3674] New: Tracking bug for OpenSSH 9.8
https://bugzilla.mindrot.org/show_bug.cgi?id=3674
Bug ID: 3674
Summary: Tracking bug for OpenSSH 9.8
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2024 Jan 09
8
[Bug 3651] New: tracking bug for openssh-9.7
https://bugzilla.mindrot.org/show_bug.cgi?id=3651
Bug ID: 3651
Summary: tracking bug for openssh-9.7
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2023 Mar 17
17
[Bug 3549] New: Tracking bug for OpenSSH 9.4
https://bugzilla.mindrot.org/show_bug.cgi?id=3549
Bug ID: 3549
Summary: Tracking bug for OpenSSH 9.4
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee:
2022 Oct 04
40
[Bug 3480] New: tracking bug for openssh-9.1
https://bugzilla.mindrot.org/show_bug.cgi?id=3480
Bug ID: 3480
Summary: tracking bug for openssh-9.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2024 Jul 07
5
[Bug 3707] New: Build failure on musl in ssh_systemd_notify (port-linux.c:369:25: error: passing argument 2 of 'connect' from incompatible pointer type)
https://bugzilla.mindrot.org/show_bug.cgi?id=3707
Bug ID: 3707
Summary: Build failure on musl in ssh_systemd_notify
(port-linux.c:369:25: error: passing argument 2 of
'connect' from incompatible pointer type)
Product: Portable OpenSSH
Version: 9.8p1
Hardware: Other
OS: Linux
2024 Aug 16
1
[Bug 3718] New: Small memory leak (+patch) in process_server_config_line_depth
https://bugzilla.mindrot.org/show_bug.cgi?id=3718
Bug ID: 3718
Summary: Small memory leak (+patch) in
process_server_config_line_depth
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2022 Apr 08
31
[Bug 3418] New: tracking bug for openssh-9.1
https://bugzilla.mindrot.org/show_bug.cgi?id=3418
Bug ID: 3418
Summary: tracking bug for openssh-9.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2023 Feb 04
26
[Bug 3533] New: tracking bug for openssh-9.3
https://bugzilla.mindrot.org/show_bug.cgi?id=3533
Bug ID: 3533
Summary: tracking bug for openssh-9.3
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2023 Oct 11
25
[Bug 3628] New: tracking bug for openssh-9.6
https://bugzilla.mindrot.org/show_bug.cgi?id=3628
Bug ID: 3628
Summary: tracking bug for openssh-9.6
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2023 Nov 14
1
[PATCH v3 1/2] Permit %L and %l percent escapes in ssh Include
This allows the localhost percent-style escapes in arguments to the
Include directive. These are useful for including host-specific ssh
configuration.
---
readconf.c | 16 +++++++++++++---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/readconf.c b/readconf.c
index a2282b562df0..ad47d0e9730a 100644
--- a/readconf.c
+++ b/readconf.c
@@ -1030,7 +1030,8 @@
2023 Dec 20
2
[PATCH RESEND 0/2] Permit %L and %l percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in ssh Include
Permit %L and %l percent escapes in sshd Include
readconf.c | 16 +++++++++++++---
servconf.c | 17 ++++++++++++++---
2 files changed, 27 insertions(+), 6 deletions(-)
base-commit:
2024 Jul 01
2
[PATCH RESEND 0/2] Permit %L and %L percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in Include
Permit %L and %l percent escapes in server Include
readconf.c | 16 +++++++++++++---
servconf.c | 21 ++++++++++++++++-----
2 files changed, 29 insertions(+), 8 deletions(-)
base-commit:
2021 Jan 02
6
[Bug 3246] New: Include directive doesn't support variable expansion
https://bugzilla.mindrot.org/show_bug.cgi?id=3246
Bug ID: 3246
Summary: Include directive doesn't support variable expansion
Product: Portable OpenSSH
Version: 8.4p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2010 Sep 28
3
netstat - kill by pid ?
I am writing a small script to kill process(es) listening on
particular port number. Here I am particularly looking at Java
servlet-containers like Tomcat and JBoss, which sometimes don't
complete their shutdown process and it still shows up as running
process with ps or netstat. This needs to be kill-ed and for that
knowing pid of that process is necessary. The netstat by default
doesn't
2009 Aug 18
15
dlm stress test hangs OCFS2
This email is also sent to cluster-devel at redhat.com. Since this issue is about
both dlm and ocfs2, I send the email here to look for help from upstream.
This is an already known issue.
on ocfs2 with user space cluster stack, run the test script from
http://people.redhat.com/~teigland/make_panic on the mounted ocfs2 volume from 2
nodes simultaneously, the access to ocfs2 volume on both nodes
2024 Aug 26
1
[Bug 3725] New: Unclear error when configuring 'ed25519' as HostKeyAlgorithms
https://bugzilla.mindrot.org/show_bug.cgi?id=3725
Bug ID: 3725
Summary: Unclear error when configuring 'ed25519' as
HostKeyAlgorithms
Product: Portable OpenSSH
Version: 9.8p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2021 Mar 29
14
[Bug 3289] New: Patch fixing the issues found by coverity scan
https://bugzilla.mindrot.org/show_bug.cgi?id=3289
Bug ID: 3289
Summary: Patch fixing the issues found by coverity scan
Product: Portable OpenSSH
Version: 8.5p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee:
2024 Mar 24
6
[Bug 3673] New: -fzero-call-used-regs=used detection fails on Linux m68k with GCC 13
https://bugzilla.mindrot.org/show_bug.cgi?id=3673
Bug ID: 3673
Summary: -fzero-call-used-regs=used detection fails on Linux
m68k with GCC 13
Product: Portable OpenSSH
Version: 9.7p1
Hardware: 68k
URL: https://bugs.debian.org/1067243
OS: Linux
Status: NEW
Severity: normal
2022 Jun 23
17
[Bug 3449] New: LocalForward doesn't support ~/path syntax for UNIX sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3449
Bug ID: 3449
Summary: LocalForward doesn't support ~/path syntax for UNIX
sockets
Product: Portable OpenSSH
Version: v9.0p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2021 Nov 22
26
[Bug 3367] New: ssh-keyscan with non-22 port does not hash correct host
https://bugzilla.mindrot.org/show_bug.cgi?id=3367
Bug ID: 3367
Summary: ssh-keyscan with non-22 port does not hash correct
host
Product: Portable OpenSSH
Version: 8.8p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: ssh-keyscan