14.04 has transitioned off Standard Support to Extended Security
Maintenance (https://ubuntu.com/blog/ubuntu-14-04-trusty-tahr) as of
April 2019. Under ESM the focus for changes is more on security
vulnerabilities in non-desktop packages. Since this issue sounds to be
more on the cosmetic side,
I wanted to check if other releases are affected as well, but it was
interesting as it didn't show up even on a Trusty container ssh'ing to
itself.
ubuntu@t:~$ unset DISPLAY ; ssh -X ubuntu@localhost 'dpkg -l openssh-client |
grep ii'
ubuntu@localhost's password:
ii openssh-client
Ok, some magic affects containers int hat case (even ssh to the LXD and then
re-ssh to itelf would not work).
But in a KVM guest I could recreate it.
$ ssh -X ubuntu@localhost uname -a
ubuntu@localhost's password:
DISPLAY "(null)" invalid; disabling X11 forwarding
Linux t1 3.13.0-157-generic
** Changed in: openssh (Debian)
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1792231
Title:
openssh-client: 'DISPLAY "(null)"
Xenial and Bionic are not affected, only Trusty
** Also affects: openssh (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: openssh (Ubuntu Trusty)
Status: New => Triaged
** Changed in: openssh (Ubuntu)
Status: Triaged => Fix Released
--
You received this
Broken since security update on Thu, 05 May 2016
Fixed in Debian in openssh/1:6.7p1-5+deb8u7
Per the Debian bug they were affected as well re-using our CVE fixes in Debian.
I think we can use the changes taken for openssh/1:6.7p1-5+deb8u7 when they are
visible.
Right now I don't see more yet, so
6 matches
Mail list logo