Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tigervnc-server-minimal-1.13.1-9.el9 RPM for ppc64le

From CentOS Stream 9 AppStream for ppc64le

Name: tigervnc-server-minimal Distribution: CentOS
Version: 1.13.1 Vendor: CentOS
Release: 9.el9 Build date: Tue Apr 16 11:20:12 2024
Group: Unspecified Build host: ppc64le-01.stream.rdu2.redhat.com
Size: 3830133 Source RPM: tigervnc-1.13.1-9.el9.src.rpm
Packager: builder@centos.org
Url: http://www.tigervnc.com
Summary: A minimal installation of TigerVNC server
The VNC system allows you to access the same desktop from a wide
variety of platforms. This package contains minimal installation
of TigerVNC server, allowing others to access the desktop on your
machine.

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Tue Apr 16 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-9
  - Fix CVE-2024-31080 tigervnc: xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents
    Resolves: RHEL-30756
  - Fix CVE-2024-31083 tigervnc: xorg-x11-server: User-after-free in ProcRenderAddGlyphs
    Resolves: RHEL-30768
  - Fix CVE-2024-31081 tigervnc: xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice
    Resolves: RHEL-30762
* Wed Feb 07 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-8
  - Fix copy/paste error in the DeviceStateNotify
    Resolves: RHEL-20533
* Mon Jan 22 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-7
  - Fix CVE-2024-21886 tigervnc: xorg-x11-server: heap buffer overflow in DisableDevice
    Resolves: RHEL-20389
  - Fix CVE-2024-21885 tigervnc: xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent
    Resolves: RHEL-20383
  - Fix CVE-2024-0229 tigervnc: xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access
    Resolves: RHEL-20533
  - Fix CVE-2023-6816 tigervnc: xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer
    Resolves: RHEL-21213
* Mon Jan 08 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-6
  - Use dup() to get available file descriptor when using -inetd option
    Resolves: RHEL-19858
* Mon Dec 18 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-5
  - Fix CVE-2023-6377 tigervnc: xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions
    Resolves: RHEL-18414
  - Fix CVE-2023-6478 tigervnc: xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
    Resolves: RHEL-18426
* Wed Nov 01 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-4
  - Fix CVE-2023-5380 tigervnc: xorg-x11-server: Use-after-free bug in DestroyWindow
    Resolves: RHEL-15237
  
  - Fix CVE-2023-5367 tigervnc: xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
    Resolves: RHEL-15249
* Mon Oct 09 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-3
  - Support username alias in PlainUsers
    Resolves: RHEL-8430
* Tue Apr 11 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-2
  - xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege
    Escalation Vulnerability
    Resolves: bz#2180310
* Tue Mar 21 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-1
  - 1.13.1
    Resolves: bz#2175732
* Tue Feb 21 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-12
  - SELinux: allow vncsession create .vnc directory
    Resolves: bz#2164703
* Wed Feb 15 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-11
  - Add sanity check when cleaning up keymap changes
    Resolves: bz#2169965
* Mon Feb 06 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-10
  - xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
    Resolves: bz#2167061
* Tue Dec 20 2022 Tomas Popela <tpopela@redhat.com> - 1.12.0-9
  - Rebuild for xorg-x11-server CVE-2022-46340 follow up fix
* Fri Dec 16 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-8
  - Rebuild for xorg-x11-server CVEs
    Resolves: CVE-2022-4283 (bz#2154234)
    Resolves: CVE-2022-46340 (bz#2154221)
    Resolves: CVE-2022-46341 (bz#2154224)
    Resolves: CVE-2022-46342 (bz#2154226)
    Resolves: CVE-2022-46343 (bz#2154228)
    Resolves: CVE-2022-46344 (bz#2154230)
* Thu Dec 01 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-7
  - x0vncserver: add new keysym in case we don't find matching keycode
    + actually apply the patch
    Resolves: bz#2119017
* Thu Dec 01 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-6
  - x0vncserver: add new keysym in case we don't find matching keycode
    Resolves: bz#2119017
* Mon Oct 24 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-5
  - x0vncserver: fix ghost cursor in zaphod mode (better version)
    Resolves: bz#2119016
* Tue May 31 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-4
  - Add BR: libXdamage, libXfixes, libXrandr
    Resolves: bz#2091833

Files

/usr/bin/Xvnc
/usr/bin/vncconfig
/usr/bin/vncpasswd
/usr/lib/.build-id
/usr/lib/.build-id/0a
/usr/lib/.build-id/0a/bb9601006ff1aa631164f73077d3539c60b416
/usr/lib/.build-id/15
/usr/lib/.build-id/15/e09fb5c83793b34c6c4e7901c902030d50f05b
/usr/lib/.build-id/35
/usr/lib/.build-id/35/107fc8a9b9ded3e7cb0a68ba13a0af445a65b0
/usr/share/man/man1/Xvnc.1.gz
/usr/share/man/man1/vncconfig.1.gz
/usr/share/man/man1/vncpasswd.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue May 14 03:42:20 2024