Synopsis:          Moderate: tigervnc security, bug fix, and enhancement update
Advisory ID:       SLSA-2015:2233-3
Issue Date:        2015-11-19
CVE Numbers:       CVE-2014-8240
                   CVE-2014-8241
--

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way TigerVNC handled screen sizes. A malicious VNC server
could use this flaw to cause a client to crash or, potentially, execute
arbitrary code on the client. (CVE-2014-8240)

A NULL pointer dereference flaw was found in TigerVNC's XRegion. A
malicious VNC server could use this flaw to cause a client to crash.
(CVE-2014-8241)

The tigervnc packages have been upgraded to upstream version 1.3.1, which
provides a number of bug fixes and enhancements over the previous version.

This update also fixes the following bug:

* The position of the mouse cursor in the VNC session was not correctly
communicated to the VNC viewer, resulting in cursor misplacement. The
method of displaying the remote cursor has been changed, and cursor
movements on the VNC server are now accurately reflected on the VNC
client.
--

SL7
  x86_64
    tigervnc-debuginfo-1.3.1-3.el7.x86_64.rpm
    tigervnc-server-minimal-1.3.1-3.el7.x86_64.rpm
    tigervnc-1.3.1-3.el7.x86_64.rpm
    tigervnc-server-1.3.1-3.el7.x86_64.rpm
    tigervnc-server-module-1.3.1-3.el7.x86_64.rpm
  noarch
    tigervnc-license-1.3.1-3.el7.noarch.rpm
    tigervnc-icons-1.3.1-3.el7.noarch.rpm
    tigervnc-server-applet-1.3.1-3.el7.noarch.rpm

- Scientific Linux Development Team