| Summary: | libvncserver new security issue CVE-2018-20750 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, geiger.david68210, mageia, sysadmin-bugs |
| Version: | 6 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA6-64-OK | ||
| Source RPM: | libvncserver-0.9.12-1.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2019-02-01 19:22:05 CET
Fixed both Cauldron and mga6! Thanks! I don't see the affected code in x11vnc. Advisory: ======================== Updated libvncserver packages fix security vulnerability: LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c (CVE-2018-20750). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20750 https://usn.ubuntu.com/usn/usn-3877-1 ======================== Updated packages in core/updates_testing: ======================== libvncserver1-0.9.12-1.1.mga6 libvncserver-devel-0.9.12-1.1.mga6 from libvncserver-0.9.12-1.1.mga6.src.rpm Assignee:
geiger.david68210 =>
qa-bugs Installed and tested without issues.
Tested using x11vnc server and tigervnc and krdc clients.
System: Mageia 6, x86_64, Plasma DE, LXQt DE, Intel CPU, nVidia GPU using nvidia340 proprietary driver.
$ uname -a
Linux marte 4.14.89-desktop-1.mga6 #1 SMP Mon Dec 17 13:14:48 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
$ rpm -q lib64vncserver1 krdc tigervnc
lib64vncserver1-0.9.12-1.1.mga6
krdc-17.12.2-1.mga6
tigervnc-1.8.0-1.mga6
$ strace -o x11vnc.log x11vnc -quiet
<SNIP>
The VNC desktop is: marte:0
PORT=5900
$ grep libvncserver x11vnc.log
open("/lib64/libvncserver.so.1", O_RDONLY|O_CLOEXEC) = 3Whiteboard:
(none) =>
MGA6-64-OK Validating. Advisory in Comment 2. Keywords:
(none) =>
validated_update
Dave Hodgins
2019-02-13 03:22:49 CET
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0070.html Resolution:
(none) =>
FIXED |