Change logs for libvncserver source package in Xenial

  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.6) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2020-25708.patch: fix possible divide-by-zero in
          libvncserver/rfbserver.c.
        - CVE-2020-25708
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 16 Nov 2020 10:00:09 -0300
  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.5) xenial-security; urgency=medium
    
      * SECURITY UPDATE: buffer overflow via a long socket filename
        - debian/patches/CVE-2019-20839.patch: Error out if the unix socket name
          would overflow in libvncclient/sockets.c.
        - CVE-2019-20839
      * SECURITY UPDATE: unaligned accesses in hybiReadAndDecode can lead to a
        crash
        - debian/patches/CVE-2019-20840.patch: Ensure a proper stack alignment in
          libvncserver/websockets.c.
        - CVE-2019-20840
      * SECURITY UPDATE: NULL pointer dereference in region clipping span routine
        - debian/patches/CVE-2020-14397.patch: Add NULL pointer dereference checks
          to libvncserver/rfbregion.c.
        - CVE-2020-14397
      * SECURITY UPDATE: infinite loop due to improperly closed TCP connection
        - debian/patches/CVE-2020-14398.patch: Close the connection after a certain
          number of retries in libvncclient/sockets.c.
        - CVE-2020-14398
      * SECURITY UPDATE: byte-aligned data is accessed through uint32_t pointers
        - debian/patches/CVE-2020-14399.patch: Ensure a proper stack alignment in
          libvncclient/rfbproto.c.
        - CVE-2020-14399
      * SECURITY UPDATE: byte-aligned data is accessed through uint16_t pointers
        - debian/patches/CVE-2020-14400.patch: Ensure a proper stack alignment in
          libvncserver/translate.c.
        - CVE-2020-14400
      * SECURITY UPDATE: integer overflow in bitwise operation on pixel_value
        - debian/patches/CVE-2020-14401.patch: Cast variable to 64 bit before
          performing bitwise operation.
        - CVE-2020-14401
      * SECURITY UPDATE: out-of-bounds access via encodings
        - debian/patches/CVE-2020-14402_CVE-2020-14403_CVE-2020-14404.patch:
          Check bounds before accessing array value in libvncserver/corre.c,
          libvncserver/hextile.c and libvncserver/rre.c
        - CVE-2020-14402
        - CVE-2020-14403
        - CVE-2020-14404
      * SECURITY UPDATE: unchecked TextChat allocation size
        - debian/patches/CVE-2020-14405.patch: Limit max TextChat size in
          libvncclient/rfbproto.c.
        - CVE-2020-14405
    
     -- Avital Ostromich <email address hidden>  Tue, 14 Jul 2020 09:52:11 -0400
  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: null pointer dereference in HandleZlibBPP function which
        results in DoS
        - debian/patches/CVE-2019-15680.patch: prevent dereferencing of null
          pointers during decoding in libvncclient/zlib.c and libvncclient/zrle.c.
        - CVE-2019-15680
      * SECURITY UPDATE: memory leak allows an attacker to read stack memory
        resulting in possible information disclosure
        - debian/patches/CVE-2019-15681.patch: clear a block of memory for the sct
          variable in libvncserver/rfbserver.c.
        - CVE-2019-15681
      * SECURITY UPDATE: heap buffer overflow caused by large cursor sizes
        - debian/patches/CVE-2019-15690_CVE-2019-20788.patch: limit the size of
          cursor in libvncclient/cursor.c.
        - CVE-2019-15690
        - CVE-2019-20788
      * SECURITY UPDATE: heap-based buffer overflow which allowed easy modification
        of a return address via an overwritten function pointer
        - debian/patches/CVE-2017-18922.patch: fix buffer overflow within the
          websocket decoding functionality in libvncserver/websockets.c.
        - debian/patches/encode_decode_buffers.patch: split codeBuf variable into
          encode and decode variables, allowing CVE patch to apply.
        - CVE-2017-18922
    
     -- Avital Ostromich <email address hidden>  Tue, 30 Jun 2020 11:11:21 -0400
  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.3) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Multiple security issues
        - debian/patches/CVE-2018-*.patch: add upstream commits to fix
          multiple security issues.
        - debian/libvncserver1.symbols: updated for new symbols.
        - CVE-2018-6307, CVE-2018-15126, CVE-2018-15127, CVE-2018-20019,
          CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023,
          CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750
    
     -- Marc Deslauriers <email address hidden>  Wed, 30 Jan 2019 13:24:30 -0500
  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.2) xenial-security; urgency=medium
    
      * SECURITY UPDATE: integer overflow or memory access
        - debian/patches/CVE-2018-7225.patch: limit client cut text length to
          1 MB in libvncserver/rfbserver.c.
        - CVE-2018-7225
    
     -- Marc Deslauriers <email address hidden>  Fri, 30 Mar 2018 10:40:42 -0400
  • libvncserver (0.9.10+dfsg-3ubuntu0.16.04.1) xenial-security; urgency=medium
    
      * SECURITY UPDATE: heap overflows in rectangle fill functions
        - debian/patches/CVE-2016-9941.patch: add bounds checking to
          libvncclient/rfbproto.c.
        - CVE-2016-9941
      * SECURITY UPDATE: heap overflow in Ultra type tile decoder
        - debian/patches/CVE-2016-9942.patch: use _safe variant in
          libvncclient/ultra.c.
        - CVE-2016-9942
    
     -- Marc Deslauriers <email address hidden>  Fri, 06 Jan 2017 07:55:19 -0500
  • libvncserver (0.9.10+dfsg-3build1) xenial; urgency=medium
    
      * No-change rebuild for gnutls transition.
    
     -- Matthias Klose <email address hidden>  Wed, 17 Feb 2016 22:26:21 +0000
  • libvncserver (0.9.10+dfsg-3) unstable; urgency=medium
    
      * Avoid regeneration of rfbint.h and rfbconfig.h (Closes: #786822)
    
     -- Peter Spiess-Knafl <email address hidden>  Tue, 26 May 2015 00:12:15 +0200