tigervnc-1.8.0-23.el7

エラータID: AXSA:2023-4639:01

Release date: 
Monday, January 9, 2023 - 17:03
Subject: 
tigervnc-1.8.0-23.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283)
* xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340)
* xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341)
* xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342)
* xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343)
* xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-4283
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
CVE-2022-46340
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
CVE-2022-46341
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
CVE-2022-46342
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se
CVE-2022-46343
A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
CVE-2022-46344
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. tigervnc-1.8.0-23.el7.src.rpm
    MD5: 6756614d34f649db7e3cd95ee4f672a0
    SHA-256: cad44cad19dd3167675313afa85271fb1d39aa5678f4950dd91ee71e22764a75
    Size: 1.46 MB

Asianux Server 7 for x86_64
  1. tigervnc-1.8.0-23.el7.x86_64.rpm
    MD5: 1f84fab0ca497cb86bcf0176c6309d02
    SHA-256: d5188c737e6aec378dc5a6fb92ebfca068935a5565210cb4f3e05fe07dbea6b1
    Size: 235.77 kB
  2. tigervnc-icons-1.8.0-23.el7.noarch.rpm
    MD5: f38091c876ef27fb965c094f3a20b593
    SHA-256: be748666ab00b0e88480046c902cbf75b8bb7da33cfa3e71867c69147cd23a37
    Size: 39.14 kB
  3. tigervnc-license-1.8.0-23.el7.noarch.rpm
    MD5: 4cba8f25094e58245043407b7d8a55c9
    SHA-256: b4cfa3c07f8335bf89bd4af1352ab5358b70ffd1fe62412fbce07836731ad4c4
    Size: 29.90 kB
  4. tigervnc-server-1.8.0-23.el7.x86_64.rpm
    MD5: 12f0e18a5818c27d55ffda6faad9171f
    SHA-256: 1ae9dfff04705205caa61a3988b412b3ec390d39b53db4336a5ea6cffcdb98b3
    Size: 210.91 kB
  5. tigervnc-server-minimal-1.8.0-23.el7.x86_64.rpm
    MD5: 26d4e03300cbf98c8501fa26e0188b77
    SHA-256: a2b5034a2dc4c84cab5834d63efafd2704723a74f3563b67f345be01e1ff5846
    Size: 1.04 MB