Mailinglist Archive: opensuse-updates (50 mails)

< Previous Next >
openSUSE-SU-2015:0932-1: moderate: Security update for LibVNCServer
openSUSE Security Update: Security update for LibVNCServer

Announcement ID: openSUSE-SU-2015:0932-1
Rating: moderate
Cross-References: CVE-2014-4607
Affected Products:
openSUSE 13.2

An update that fixes one vulnerability is now available.


LibVNCServer was updated to version 0.9.10 to fix several security and
non-security issues.

The following issues were fixed:
- Remove xorg-x11-devel from buildRequires, X libraries are not directly
- libvncserver-0.9.10-ossl.patch: Update, do not
RAND_load_file("/dev/urandom", 1024) if the the PRNG is already seeded.
(It always is on linux)
- Update to version 0.9.10
+ Moved the whole project from sourceforge to
+ Cleaned out the autotools build system which now uses autoreconf.
+ Updated noVNC HTML5 client to latest version.
+ Split out x11vnc sources into separate repository at
+ Split out vncterm sources into separate repository at
+ Split out VisualNaCro sources into separate repository at
+ Merged Debian patches.
+ Fixed some security-related buffer overflow cases.
+ Added compatibility headers to make LibVNCServer/LibVNCClient build on
native Windows 8.
+ Update LZO to version 2.07, fixing CVE-2014-4607.
+ Merged patches from KDE/krfb.
+ Can now do IPv6 without IPv4.
+ Fixed a use-after-free issue in scale.c.
- Update Url and download source to new project home
- Remove LibVNCServer-0.9.9-no_x11vnc.patch; upstream splited it
out of main tarball
- Rebase libvncserver-ossl.patch to upstream changes >
- Remove linuxvnc subpackage; like x11vnc, it has been splited out but is
depreciated and unmaintained.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-377=1

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 13.2 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages