Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.884322
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for tigervnc (CESA-2024:0629)
Zusammenfassung:The remote host is missing an update for the 'tigervnc'; package(s) announced via the CESA-2024:0629 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'tigervnc'
package(s) announced via the CESA-2024:0629 advisory.

Vulnerability Insight:
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)

* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)

* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)

* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Software/OS:
'tigervnc' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-6816
RHBZ#2257691
https://bugzilla.redhat.com/show_bug.cgi?id=2257691
RHSA-2024:0320
https://access.redhat.com/errata/RHSA-2024:0320
RHSA-2024:0557
https://access.redhat.com/errata/RHSA-2024:0557
RHSA-2024:0558
https://access.redhat.com/errata/RHSA-2024:0558
RHSA-2024:0597
https://access.redhat.com/errata/RHSA-2024:0597
RHSA-2024:0607
https://access.redhat.com/errata/RHSA-2024:0607
RHSA-2024:0614
https://access.redhat.com/errata/RHSA-2024:0614
RHSA-2024:0617
https://access.redhat.com/errata/RHSA-2024:0617
RHSA-2024:0621
https://access.redhat.com/errata/RHSA-2024:0621
RHSA-2024:0626
https://access.redhat.com/errata/RHSA-2024:0626
RHSA-2024:0629
https://access.redhat.com/errata/RHSA-2024:0629
RHSA-2024:2169
https://access.redhat.com/errata/RHSA-2024:2169
RHSA-2024:2170
https://access.redhat.com/errata/RHSA-2024:2170
RHSA-2024:2996
https://access.redhat.com/errata/RHSA-2024:2996
http://www.openwall.com/lists/oss-security/2024/01/18/1
https://access.redhat.com/security/cve/CVE-2023-6816
https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
https://security.gentoo.org/glsa/202401-30
https://security.netapp.com/advisory/ntap-20240307-0006/
Common Vulnerability Exposure (CVE) ID: CVE-2024-0229
RHBZ#2256690
https://bugzilla.redhat.com/show_bug.cgi?id=2256690
RHSA-2024:2995
https://access.redhat.com/errata/RHSA-2024:2995
https://access.redhat.com/security/cve/CVE-2024-0229
Common Vulnerability Exposure (CVE) ID: CVE-2024-21885
RHBZ#2256540
https://bugzilla.redhat.com/show_bug.cgi?id=2256540
https://access.redhat.com/security/cve/CVE-2024-21885
https://security.netapp.com/advisory/ntap-20240503-0004/
Common Vulnerability Exposure (CVE) ID: CVE-2024-21886
RHBZ#2256542
https://bugzilla.redhat.com/show_bug.cgi?id=2256542
https://access.redhat.com/security/cve/CVE-2024-21886
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.