Bug#849479: tigervnc: CVE-2014-8240: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling

2016-12-29 Thread Ola Lundqvist
Hi Yes you are right. I misread the code. Thank you very much for noticing. // Ola On 29 December 2016 at 06:07, Salvatore Bonaccorso wrote: > Example, we have the following code in Image.cxx (all Debian patches > applied): > > 75 void Image::Init(int width, int height) >

Bug#849479: tigervnc: CVE-2014-8240: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling

2016-12-28 Thread Salvatore Bonaccorso
Example, we have the following code in Image.cxx (all Debian patches applied): 75 void Image::Init(int width, int height) 76 { 77 Visual* vis = DefaultVisual(dpy, DefaultScreen(dpy)); 78 trueColor = (vis->c_class == TrueColor); 79

Bug#849479: tigervnc: CVE-2014-8240: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling

2016-12-27 Thread Salvatore Bonaccorso
Source: tigervnc Version: 1.6.0+dfsg-4 Severity: grave Tags: security patch upstream Justification: user security hole Hi, the following vulnerability was published for tigervnc. CVE-2014-8240[0]: | Integer overflow in TigerVNC allows remote VNC servers to cause a | denial of service (crash)