tigervnc-1.15.0-9.el8_10.ML.1
エラータID: AXSA:2026-592:02
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
* TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-33999
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
CVE-2026-34001
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
CVE-2026-34003
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
CVE-2026-34352
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
Update packages.
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
N/A
SRPMS
- tigervnc-1.15.0-9.el8_10.ML.1.src.rpm
MD5: fae127306750b3d83e37a67f76b3da90
SHA-256: 40fd559c56be153ca99f0848ad8e05435b5ed36ae7db784e3c2dc04fda2f1b81
Size: 2.11 MB
Asianux Server 8 for x86_64
- tigervnc-1.15.0-9.el8_10.ML.1.x86_64.rpm
MD5: e2b9f6334b0ed809b4d7d3420f59a7fb
SHA-256: 3233dea08c6800b18475943e48a41aff7be43e29bf271c731108aa6362f3b1b2
Size: 407.98 kB - tigervnc-icons-1.15.0-9.el8_10.ML.1.noarch.rpm
MD5: ab623b96d46850e9f1c6ac7fb3fa982f
SHA-256: ef55728dd1b37ae087bde4c9ff953247943750f682d0b8b31ae1a684b3f4b3e2
Size: 64.71 kB - tigervnc-license-1.15.0-9.el8_10.ML.1.noarch.rpm
MD5: 957397ec8e2774621c3a145fd8c6e71d
SHA-256: 6a950347544681e37ccf93d95917a8bf7df4a0c5d8f9aab1cfa51a3c953f598b
Size: 45.09 kB - tigervnc-selinux-1.15.0-9.el8_10.ML.1.noarch.rpm
MD5: 46bce9192aae2eaa9a151996c39dd471
SHA-256: 2442010364f09fcf149cd77bc5624cc151de7717aced09c6ed0ff4db863fa3e4
Size: 54.32 kB - tigervnc-server-1.15.0-9.el8_10.ML.1.x86_64.rpm
MD5: 715b384c1d2732acce1e321d554171c5
SHA-256: d10e34d2f61dc3a6cd6d52d2031aa005a1a8f165c915c54ac717561074288153
Size: 316.18 kB - tigervnc-server-minimal-1.15.0-9.el8_10.ML.1.x86_64.rpm
MD5: 872a2ce91de8fcbf95a9f803f01f983e
SHA-256: ff5ea43b93d699fc9998c1926fa5583db66643d1ea76f9a5f106e254fc880451
Size: 1.18 MB - tigervnc-server-module-1.15.0-9.el8_10.ML.1.x86_64.rpm
MD5: bbdb7784f2eee6d8dedb679f5e3e70ed
SHA-256: bdecf1f77d41f770afd58293c4e22260022d3869d3924eff48393c171d87c624
Size: 311.34 kB