Hi
Yes you are right. I misread the code. Thank you very much for noticing.
// Ola
On 29 December 2016 at 06:07, Salvatore Bonaccorso wrote:
> Example, we have the following code in Image.cxx (all Debian patches
> applied):
>
> 75 void Image::Init(int width, int height)
> 76 {
> 77 Visual*
Example, we have the following code in Image.cxx (all Debian patches
applied):
75 void Image::Init(int width, int height)
76 {
77 Visual* vis = DefaultVisual(dpy, DefaultScreen(dpy));
78 trueColor = (vis->c_class == TrueColor);
79
Source: tigervnc
Version: 1.6.0+dfsg-4
Severity: grave
Tags: security patch upstream
Justification: user security hole
Hi,
the following vulnerability was published for tigervnc.
CVE-2014-8240[0]:
| Integer overflow in TigerVNC allows remote VNC servers to cause a
| denial of service (crash) and
3 matches
Mail list logo