openSUSE Security Update: Security update for LibVNCServer
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2020:1025-1
Rating:             important
References:         #1173477 #1173691 #1173694 #1173700 #1173701 
                    #1173743 #1173874 #1173875 #1173876 #1173880 
                    
Cross-References:   CVE-2017-18922 CVE-2018-21247 CVE-2019-20839
                    CVE-2019-20840 CVE-2020-14397 CVE-2020-14398
                    CVE-2020-14399 CVE-2020-14400 CVE-2020-14401
                    CVE-2020-14402
Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 10 vulnerabilities is now available.

Description:

   This update for LibVNCServer fixes the following issues:

   - security update
   - added patches fix CVE-2018-21247 [bsc#1173874], uninitialized memory
     contents are vulnerable to Information leak
     + LibVNCServer-CVE-2018-21247.patch fix CVE-2019-20839 [bsc#1173875],
       buffer overflow in ConnectClientToUnixSock()
     + LibVNCServer-CVE-2019-20839.patch fix CVE-2019-20840 [bsc#1173876],
       unaligned accesses in hybiReadAndDecode can lead to denial of service
     + LibVNCServer-CVE-2019-20840.patch fix CVE-2020-14398 [bsc#1173880],
       improperly closed TCP connection causes an infinite loop in
       libvncclient/sockets.c
     + LibVNCServer-CVE-2020-14398.patch fix CVE-2020-14397 [bsc#1173700],
       NULL pointer dereference in libvncserver/rfbregion.c
     + LibVNCServer-CVE-2020-14397.patch fix CVE-2020-14399 [bsc#1173743],
       Byte-aligned data is accessed through uint32_t pointers in
       libvncclient/rfbproto.c.
     + LibVNCServer-CVE-2020-14399.patch fix CVE-2020-14400 [bsc#1173691],
       Byte-aligned data is accessed through uint16_t pointers in
       libvncserver/translate.c.
     + LibVNCServer-CVE-2020-14400.patch fix CVE-2020-14401 [bsc#1173694],
       potential integer overflows in libvncserver/scale.c
     + LibVNCServer-CVE-2020-14401.patch fix CVE-2020-14402 [bsc#1173701],
       out-of-bounds access via encodings.
     + LibVNCServer-CVE-2020-14402,14403,14404.patch fix CVE-2017-18922
       [bsc#1173477], preauth buffer overwrite

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2020-1025=1



Package List:

   - openSUSE Leap 15.2 (i586 x86_64):

      LibVNCServer-debugsource-0.9.10-lp152.9.8.1
      LibVNCServer-devel-0.9.10-lp152.9.8.1
      libvncclient0-0.9.10-lp152.9.8.1
      libvncclient0-debuginfo-0.9.10-lp152.9.8.1
      libvncserver0-0.9.10-lp152.9.8.1
      libvncserver0-debuginfo-0.9.10-lp152.9.8.1


References:

   https://www.suse.com/security/cve/CVE-2017-18922.html
   https://www.suse.com/security/cve/CVE-2018-21247.html
   https://www.suse.com/security/cve/CVE-2019-20839.html
   https://www.suse.com/security/cve/CVE-2019-20840.html
   https://www.suse.com/security/cve/CVE-2020-14397.html
   https://www.suse.com/security/cve/CVE-2020-14398.html
   https://www.suse.com/security/cve/CVE-2020-14399.html
   https://www.suse.com/security/cve/CVE-2020-14400.html
   https://www.suse.com/security/cve/CVE-2020-14401.html
   https://www.suse.com/security/cve/CVE-2020-14402.html
   https://bugzilla.suse.com/1173477
   https://bugzilla.suse.com/1173691
   https://bugzilla.suse.com/1173694
   https://bugzilla.suse.com/1173700
   https://bugzilla.suse.com/1173701
   https://bugzilla.suse.com/1173743
   https://bugzilla.suse.com/1173874
   https://bugzilla.suse.com/1173875
   https://bugzilla.suse.com/1173876
   https://bugzilla.suse.com/1173880

-- 

openSUSE: 2020:1025-1: important: LibVNCServer

July 21, 2020
An update that fixes 10 vulnerabilities is now available.

Description

This update for LibVNCServer fixes the following issues: - security update - added patches fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak + LibVNCServer-CVE-2018-21247.patch fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock() + LibVNCServer-CVE-2019-20839.patch fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service + LibVNCServer-CVE-2019-20840.patch fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c + LibVNCServer-CVE-2020-14398.patch fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c + LibVNCServer-CVE-2020-14397.patch fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. + LibVNCServer-CVE-2020-14399.patch fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. + LibVNCServer-CVE-2020-14400.patch fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c + LibVNCServer-CVE-2020-14401.patch fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings. + LibVNCServer-CVE-2020-14402,14403,14404.patch fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1025=1


Package List

- openSUSE Leap 15.2 (i586 x86_64): LibVNCServer-debugsource-0.9.10-lp152.9.8.1 LibVNCServer-devel-0.9.10-lp152.9.8.1 libvncclient0-0.9.10-lp152.9.8.1 libvncclient0-debuginfo-0.9.10-lp152.9.8.1 libvncserver0-0.9.10-lp152.9.8.1 libvncserver0-debuginfo-0.9.10-lp152.9.8.1


References

https://www.suse.com/security/cve/CVE-2017-18922.html https://www.suse.com/security/cve/CVE-2018-21247.html https://www.suse.com/security/cve/CVE-2019-20839.html https://www.suse.com/security/cve/CVE-2019-20840.html https://www.suse.com/security/cve/CVE-2020-14397.html https://www.suse.com/security/cve/CVE-2020-14398.html https://www.suse.com/security/cve/CVE-2020-14399.html https://www.suse.com/security/cve/CVE-2020-14400.html https://www.suse.com/security/cve/CVE-2020-14401.html https://www.suse.com/security/cve/CVE-2020-14402.html https://bugzilla.suse.com/1173477 https://bugzilla.suse.com/1173691 https://bugzilla.suse.com/1173694 https://bugzilla.suse.com/1173700 https://bugzilla.suse.com/1173701 https://bugzilla.suse.com/1173743 https://bugzilla.suse.com/1173874 https://bugzilla.suse.com/1173875 https://bugzilla.suse.com/1173876 https://bugzilla.suse.com/1173880--


Severity
Announcement ID: openSUSE-SU-2020:1025-1
Rating: important
Affected Products: openSUSE Leap 15.2

Related News