[Bug 1808989] Re: tightvnc vulnerabilities

2020-12-16 Thread Bug Watch Updater
** Changed in: tightvnc (Debian) Status: Unknown => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1808989 Title: tightvnc vulnerabilities To manage notifications about this bug

[Bug 1808989] Re: tightvnc vulnerabilities

2020-12-16 Thread Logan Rosen
** Bug watch added: Debian Bug tracker #945364 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945364 ** Also affects: tightvnc (Debian) via https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945364 Importance: Unknown Status: Unknown -- You received this bug notification becaus

[Bug 1808989] Re: tightvnc vulnerabilities

2019-01-10 Thread Jamie Strandboge
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1808989 Title: tightvnc vulnerabilities To manage notifications about this bug go to: https:

[Bug 1808989] Re: tightvnc vulnerabilities

2018-12-20 Thread Pavel Cheremushkin
In particular, following 4 issues are related to to tightvnc viewer: ``` 1. global buffer overflow in corre.c In `vnc_unixsrc/vncviewer/corre.c` inside the `HandleCoRREBPP` function global buffer overflow occurs due to the lack of size check. `buffer` is defined in rfbproto.c:96 as ```ch

[Bug 1808989] Re: tightvnc vulnerabilities

2018-12-20 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: tightvnc (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1808989 Title: t