USN-5965-1

Source
https://ubuntu.com/security/notices/USN-5965-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5965-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5965-1
Upstream
Related
Published
2023-03-21T01:41:15Z
Modified
2026-04-24T09:35:38.452054Z
Summary
tigervnc vulnerability
Details

It was discovered that TigerVNC mishandled TLS certificate exceptions. An attacker could use this vulnerability to impersonate any server after a client had added an exception and obtain sensitive information.

References

Affected packages

Ubuntu:Pro:20.04:LTS / tigervnc

Package

Name
tigervnc
Purl
pkg:deb/ubuntu/tigervnc@1.10.1+dfsg-3ubuntu0.1+esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.1+dfsg-3ubuntu0.1+esm2

Affected versions

1.*
1.9.0+dfsg-3
1.9.0+dfsg-4
1.10.1+dfsg-1
1.10.1+dfsg-2
1.10.1+dfsg-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "tigervnc-common",
            "binary_version": "1.10.1+dfsg-3ubuntu0.1+esm2"
        },
        {
            "binary_name": "tigervnc-scraping-server",
            "binary_version": "1.10.1+dfsg-3ubuntu0.1+esm2"
        },
        {
            "binary_name": "tigervnc-standalone-server",
            "binary_version": "1.10.1+dfsg-3ubuntu0.1+esm2"
        },
        {
            "binary_name": "tigervnc-viewer",
            "binary_version": "1.10.1+dfsg-3ubuntu0.1+esm2"
        },
        {
            "binary_name": "tigervnc-xorg-extension",
            "binary_version": "1.10.1+dfsg-3ubuntu0.1+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5965-1.json"