Synopsis: Moderate: tigervnc security, bug fix, and enhancement update Advisory ID: SLSA-2015:2233-3 Issue Date: 2015-11-19 CVE Numbers: CVE-2014-8240 CVE-2014-8241 -- An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way TigerVNC handled screen sizes. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client. (CVE-2014-8240) A NULL pointer dereference flaw was found in TigerVNC's XRegion. A malicious VNC server could use this flaw to cause a client to crash. (CVE-2014-8241) The tigervnc packages have been upgraded to upstream version 1.3.1, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * The position of the mouse cursor in the VNC session was not correctly communicated to the VNC viewer, resulting in cursor misplacement. The method of displaying the remote cursor has been changed, and cursor movements on the VNC server are now accurately reflected on the VNC client. -- SL7 x86_64 tigervnc-debuginfo-1.3.1-3.el7.x86_64.rpm tigervnc-server-minimal-1.3.1-3.el7.x86_64.rpm tigervnc-1.3.1-3.el7.x86_64.rpm tigervnc-server-1.3.1-3.el7.x86_64.rpm tigervnc-server-module-1.3.1-3.el7.x86_64.rpm noarch tigervnc-license-1.3.1-3.el7.noarch.rpm tigervnc-icons-1.3.1-3.el7.noarch.rpm tigervnc-server-applet-1.3.1-3.el7.noarch.rpm - Scientific Linux Development Team