Security update for LibVNCServer
Announcement ID: | SUSE-SU-2015:2088-2 |
Rating: | moderate |
References: | #854151 #897031 |
Affected Products: |
An update that fixes 5 vulnerabilities is now available.
Description:
The LibVNCServer package was updated to fix the following security issues:
- bsc#897031: fix several security issues:
* CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
* CVE-2014-6052: Lack of malloc() return value checking on client side.
* CVE-2014-6053: Server crash on a very large ClientCutText message.
* CVE-2014-6054: Server crash when scaling factor is set to zero.
* CVE-2014-6055: Multiple stack overflows in File Transfer feature.
- bsc#854151: Restrict the SSL cipher suite.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2015-890=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2015-890=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
- LibVNCServer-debugsource-0.9.9-16.1
- LibVNCServer-devel-0.9.9-16.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
- LibVNCServer-debugsource-0.9.9-16.1
- libvncclient0-0.9.9-16.1
- libvncclient0-debuginfo-0.9.9-16.1
- libvncserver0-0.9.9-16.1
- libvncserver0-debuginfo-0.9.9-16.1
References:
- https://www.suse.com/security/cve/CVE-2014-6051.html
- https://www.suse.com/security/cve/CVE-2014-6052.html
- https://www.suse.com/security/cve/CVE-2014-6053.html
- https://www.suse.com/security/cve/CVE-2014-6054.html
- https://www.suse.com/security/cve/CVE-2014-6055.html
- https://bugzilla.suse.com/854151
- https://bugzilla.suse.com/897031