Subject: | |
From: | |
Reply To: | |
Date: | Mon, 21 Dec 2015 23:10:18 +0000 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: tigervnc security, bug fix, and enhancement update
Advisory ID: SLSA-2015:2233-3
Issue Date: 2015-11-19
CVE Numbers: CVE-2014-8240
CVE-2014-8241
--
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way TigerVNC handled screen sizes. A malicious VNC server
could use this flaw to cause a client to crash or, potentially, execute
arbitrary code on the client. (CVE-2014-8240)
A NULL pointer dereference flaw was found in TigerVNC's XRegion. A
malicious VNC server could use this flaw to cause a client to crash.
(CVE-2014-8241)
The tigervnc packages have been upgraded to upstream version 1.3.1, which
provides a number of bug fixes and enhancements over the previous version.
This update also fixes the following bug:
* The position of the mouse cursor in the VNC session was not correctly
communicated to the VNC viewer, resulting in cursor misplacement. The
method of displaying the remote cursor has been changed, and cursor
movements on the VNC server are now accurately reflected on the VNC
client.
--
SL7
x86_64
tigervnc-debuginfo-1.3.1-3.el7.x86_64.rpm
tigervnc-server-minimal-1.3.1-3.el7.x86_64.rpm
tigervnc-1.3.1-3.el7.x86_64.rpm
tigervnc-server-1.3.1-3.el7.x86_64.rpm
tigervnc-server-module-1.3.1-3.el7.x86_64.rpm
noarch
tigervnc-license-1.3.1-3.el7.noarch.rpm
tigervnc-icons-1.3.1-3.el7.noarch.rpm
tigervnc-server-applet-1.3.1-3.el7.noarch.rpm
- Scientific Linux Development Team
|
|
|