SUSE-SU-2018:0830-1: important: Security update for LibVNCServer

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Mar 27 13:07:38 MDT 2018


   SUSE Security Update: Security update for LibVNCServer
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0830-1
Rating:             important
References:         #1017711 #1017712 #1081493 
Cross-References:   CVE-2016-9941 CVE-2016-9942 CVE-2018-7225
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:


   LibVNCServer was updated to fix two security issues.

   These security issues were fixed:

   - CVE-2018-7225: Missing input sanitization inside rfbserver.c
     rfbProcessClientNormalMessage() (bsc#1081493).
   - CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote
     servers to cause a denial of service (application crash) or possibly
     execute arbitrary code via a crafted FramebufferUpdate message with the
     Ultra type tile, such that the LZO payload decompressed length exceeds
     what is specified by the tile dimensions (bsc#1017712).
   - CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote
     servers to cause a denial of service (application crash) or possibly
     execute arbitrary code via a crafted FramebufferUpdate message
     containing a subrectangle outside of the client drawing area
     (bsc#1017711).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-554=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-554=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-554=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-554=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-554=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      LibVNCServer-debugsource-0.9.9-17.5.1
      LibVNCServer-devel-0.9.9-17.5.1

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      LibVNCServer-debugsource-0.9.9-17.5.1
      LibVNCServer-devel-0.9.9-17.5.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      LibVNCServer-debugsource-0.9.9-17.5.1
      libvncclient0-0.9.9-17.5.1
      libvncclient0-debuginfo-0.9.9-17.5.1
      libvncserver0-0.9.9-17.5.1
      libvncserver0-debuginfo-0.9.9-17.5.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      LibVNCServer-debugsource-0.9.9-17.5.1
      libvncclient0-0.9.9-17.5.1
      libvncclient0-debuginfo-0.9.9-17.5.1
      libvncserver0-0.9.9-17.5.1
      libvncserver0-debuginfo-0.9.9-17.5.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      LibVNCServer-debugsource-0.9.9-17.5.1
      libvncclient0-0.9.9-17.5.1
      libvncclient0-debuginfo-0.9.9-17.5.1
      libvncserver0-0.9.9-17.5.1
      libvncserver0-debuginfo-0.9.9-17.5.1


References:

   https://www.suse.com/security/cve/CVE-2016-9941.html
   https://www.suse.com/security/cve/CVE-2016-9942.html
   https://www.suse.com/security/cve/CVE-2018-7225.html
   https://bugzilla.suse.com/1017711
   https://bugzilla.suse.com/1017712
   https://bugzilla.suse.com/1081493



More information about the sle-updates mailing list