-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 5 Jan 2007 20:39:03 +1100 Source: vnc4 Binary: vnc4-common vnc4server xvnc4viewer Architecture: ia64 Version: 4.1.1+xorg1.0.2-0ubuntu1.6.06 Distribution: dapper-security Urgency: low Maintainer: Ubuntu/ia64 Build Daemon Changed-By: William Grant Description: vnc4-common - Virtual network computing server software vnc4server - Virtual network computing server software xvnc4viewer - Virtual network computing client software for X Changes: vnc4 (4.1.1+xorg1.0.2-0ubuntu1.6.06) dapper-security; urgency=low . * SECURITY UPDATE: Fix password-bypassing exploit. * common/rfb/SConnection.cxx: Confirm that the requested authentication method is actually valid. Patch taken from 4.1.2. * References: - CVE-2006-2369 Files: 75eda3054672d8fef4fe49549d5f10cb 1655606 x11 optional vnc4server_4.1.1+xorg1.0.2-0ubuntu1.6.06_ia64.deb 29f7a90e65ed1e1d453795b461da1b9e 213988 net optional xvnc4viewer_4.1.1+xorg1.0.2-0ubuntu1.6.06_ia64.deb 7bf82f1eb712f32cb179ff92e0a5f6e7 18876 x11 optional vnc4-common_4.1.1+xorg1.0.2-0ubuntu1.6.06_ia64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFnvbD0N0xjzyQZEIRAmu1AJ4vbRL02LD3b8wXBr5LNrRzd5kVkACfadHu KTG8hw6K2L7Zt1PuS+KHz1M= =j+4l -----END PGP SIGNATURE-----