RLSA-2024:0607

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:0607.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:0607
Related
Published
2024-02-12T20:17:26.918627Z
Modified
2024-02-12T20:19:02.838845Z
Summary
Important: tigervnc security update
Details

Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

  • xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)

  • xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)

  • xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)

  • xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / tigervnc

Package

Name
tigervnc
Purl
pkg:rpm/rocky-linux/tigervnc?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:1.13.1-2.el8_9.7