close #1258 thanks Hello,
we are very hopeful that X2Go issue #1258 reported by you has been resolved in the new release (4.1.1.1) of the X2Go source project »src:x2goclient«. You can view the complete changelog entry of src:x2goclient (4.1.1.1) below, and you can use the following link to view all the code changes between this and the last release of src:x2goclient. http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=b4421bf6fc16d46e68dde8a0b9d48252804a30f1;hp=d8f5e5a4a51724ef3620e7f347644338e2449444 If you feel that the issue has not been resolved satisfyingly, feel free to reopen this bug report or submit a follow-up report with further observations described based on the new released version of src:x2goclient. Thanks a lot for contributing to X2Go!!! light+love X2Go Git Admin (on behalf of the sender of this mail) --- X2Go Component: src:x2goclient Version: 4.1.1.1-2018.03.01 Status: RELEASE Date: Wed, 28 Feb 2018 20:53:41 -0500 Fixes: 1258 Changes: x2goclient (4.1.1.1-2018.03.01) RELEASED; urgency=medium . [ Mike DePaulo ] * New upstream version (4.1.1.1-2018.03.01): - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with SSH Server (e.g. for changing expired password) when using GSSAPI/Kerberos because the interaction code does not support it yet. Fixes: #1258 - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3. Note that x2goclient was only ever affected if the permissions on the installation folder were changed to give users write access, or if x2goclient was copied/extracted to a folder where users could write. _______________________________________________ x2go-dev mailing list x2go-dev@lists.x2go.org https://lists.x2go.org/listinfo/x2go-dev