Mageia 2020-0242: vino security update
Summary
Updated vino packages fix security vulnerabilities:
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in
LibVNCServer did not properly handle attempts to send a large amount of
ClientCutText data, which allowed remote attackers to cause a denial of
service (memory consumption or daemon crash) via a crafted message that
was processed by using a single unchecked malloc (CVE-2014-6053).
An issue was discovered in LibVNCServer. rfbProcessClientNormalMessage()
in rfbserver.c did not sanitize msg.cct.length, leading to access to
uninitialized and potentially sensitive data or possibly unspecified other
impact (e.g., an integer overflow) via specially crafted VNC packets
(CVE-2018-7225).
LibVNC contained a memory leak in VNC server code, which allowed an
attacker to read stack memory and could be abused for information
disclosure. Combined with another vulnerability, it could be used to
leak stack memory and bypass ASLR. This attack appeared to be exploitable
via netwo...
References
- https://bugs.mageia.org/show_bug.cgi?id=25786
- https://www.debian.org/lts/security/2019/dla-2014
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15681
Resolution
MGASA-2020-0242 - Updated vino packages fix security vulnerability
SRPMS
- 7/core/vino-3.22.0-3.1.mga7