-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 5 Jan 2007 20:39:03 +1100 Source: vnc4 Binary: vnc4-common vnc4server xvnc4viewer Architecture: i386 Version: 4.1.1+xorg1.0.2-0ubuntu1.6.06 Distribution: dapper-security Urgency: low Maintainer: Ubuntu/i386 Build Daemon Changed-By: William Grant Description: vnc4-common - Virtual network computing server software vnc4server - Virtual network computing server software xvnc4viewer - Virtual network computing client software for X Changes: vnc4 (4.1.1+xorg1.0.2-0ubuntu1.6.06) dapper-security; urgency=low . * SECURITY UPDATE: Fix password-bypassing exploit. * common/rfb/SConnection.cxx: Confirm that the requested authentication method is actually valid. Patch taken from 4.1.2. * References: - CVE-2006-2369 Files: 054b361853ecfbb51fd6bc325df0b894 1010856 x11 optional vnc4server_4.1.1+xorg1.0.2-0ubuntu1.6.06_i386.deb a2b093670de2f6658c0bf2da572c8e3c 133984 net optional xvnc4viewer_4.1.1+xorg1.0.2-0ubuntu1.6.06_i386.deb 8706aecbeff74d899c3bfb92d77c2c73 16070 x11 optional vnc4-common_4.1.1+xorg1.0.2-0ubuntu1.6.06_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFnvPA0N0xjzyQZEIRAp41AJwJHTsgdpyOHPvSTeFwtvn47S77IACffYWl sYLX+Pu5yuGZbLZhbYyYyy8= =o+iB -----END PGP SIGNATURE-----