Hi, * Simon Iremonger <deb...@iremonger.me.uk> [2009-05-11 13:52]: [...] > As far as I can tell, The Debian pagkages for xtightvncviewer > (also included unchanged in ubuntu) are still vulnerable to > known problem fixed upstream. > > Advisory here:- > http://secunia.com/advisories/33807/ > > Fixed upstream as per:- > http://vnc-tight.sourceforge.net/release-1.3.10.html > > Please correct me if I've missed anything! > With thanks,
How did you verify this? From what I know this issue only affects the windows version. Cheers Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgph3Pxyo95UL.pgp
Description: PGP signature