Mailinglist Archive: opensuse-updates (50 mails)

< Previous Next >
openSUSE-SU-2015:0932-1: moderate: Security update for LibVNCServer
openSUSE Security Update: Security update for LibVNCServer
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0932-1
Rating: moderate
References:
Cross-References: CVE-2014-4607
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


LibVNCServer was updated to version 0.9.10 to fix several security and
non-security issues.

The following issues were fixed:
- Remove xorg-x11-devel from buildRequires, X libraries are not directly
used/linked
- libvncserver-0.9.10-ossl.patch: Update, do not
RAND_load_file("/dev/urandom", 1024) if the the PRNG is already seeded.
(It always is on linux)
- Update to version 0.9.10
+ Moved the whole project from sourceforge to https://libvnc.github.io/.
+ Cleaned out the autotools build system which now uses autoreconf.
+ Updated noVNC HTML5 client to latest version.
+ Split out x11vnc sources into separate repository at
https://github.com/LibVNC/x11vnc
+ Split out vncterm sources into separate repository at
https://github.com/LibVNC/vncterm
+ Split out VisualNaCro sources into separate repository at
https://github.com/LibVNC/VisualNaCro
+ Merged Debian patches.
+ Fixed some security-related buffer overflow cases.
+ Added compatibility headers to make LibVNCServer/LibVNCClient build on
native Windows 8.
+ Update LZO to version 2.07, fixing CVE-2014-4607.
+ Merged patches from KDE/krfb.
+ Can now do IPv6 without IPv4.
+ Fixed a use-after-free issue in scale.c.
- Update Url and download source to new project home
- Remove LibVNCServer-0.9.9-no_x11vnc.patch; upstream splited it
out of main tarball
- Rebase libvncserver-ossl.patch to upstream changes >
libvncserver-0.9.10-ossl.patch
- Remove linuxvnc subpackage; like x11vnc, it has been splited out but is
depreciated and unmaintained.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-377=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

LibVNCServer-debugsource-0.9.10-10.4.1
LibVNCServer-devel-0.9.10-10.4.1
libvncclient0-0.9.10-10.4.1
libvncclient0-debuginfo-0.9.10-10.4.1
libvncserver0-0.9.10-10.4.1
libvncserver0-debuginfo-0.9.10-10.4.1


References:

https://www.suse.com/security/cve/CVE-2014-4607.html


< Previous Next >
This Thread
  • No further messages