MGASA-2015-0459

Source
https://advisories.mageia.org/MGASA-2015-0459.html
Import Source
https://advisories.mageia.org/MGASA-2015-0459.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0459
Related
Published
2015-11-26T20:47:39Z
Modified
2015-11-26T20:42:56Z
Summary
Updated tigervnc packages fix security vulnerabilities
Details

Updated tigervnc packages fix security vulnerabilities:

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way TigerVNC handled screen sizes. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client (CVE-2014-8240).

A NULL pointer dereference flaw was found in TigerVNC's XRegion. A malicious VNC server could use this flaw to cause a client to crash (CVE-2014-8241).

References
Credits

Affected packages

Mageia:5 / tigervnc

Package

Name
tigervnc
Purl
pkg:rpm/mageia/tigervnc?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.1-6.1.mga5

Ecosystem specific

{
    "section": "core"
}