[Bug 1399584] Re: Sync libvncserver 0.9.9+dfsg-6.1 (main) from Debian unstable (main)

Daniel Holbach daniel.holbach at ubuntu.com
Mon Dec 8 08:05:47 UTC 2014


This bug was fixed in the package libvncserver - 0.9.9+dfsg-6.1
Sponsored for LocutusOfBorg (costamagnagianfranco)

---------------
libvncserver (0.9.9+dfsg-6.1) unstable; urgency=medium

  * Non-maintainer upload.
  * CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055:
    Multiple issues in libVNCserver -- cherry picking targeted fixed from
    upstream (Closes: #762745)

 -- Tobias Frost <tobi at debian.org>  Sun, 23 Nov 2014 16:19:53 +0100

** Changed in: libvncserver (Ubuntu)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6051

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6052

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6053

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6054

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6055

-- 
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1399584

Title:
  Sync libvncserver 0.9.9+dfsg-6.1 (main) from Debian unstable (main)

Status in libvncserver package in Ubuntu:
  Fix Released

Bug description:
  Please sync libvncserver 0.9.9+dfsg-6.1 (main) from Debian unstable
  (main)

  Explanation of the Ubuntu delta and why it can be dropped:
    * SECURITY UPDATE: denial of service and possible code execution via
      integer overflow and lack of malloc error handling in
      MallocFrameBuffer()
      - debian/patches/CVE-2014-6051-6052.patch: check size and handle
        return code in libvncclient/vncviewer.c, handle return code in
        libvncclient/rfbproto.c.
      - CVE-2014-6051
      - CVE-2014-6052
    * SECURITY UPDATE: denial of service via large ClientCutText message
      - debian/patches/CVE-2014-6053.patch: check malloc result in
        libvncserver/rfbserver.c.
      - CVE-2014-6053
    * SECURITY UPDATE: denial of service via zero scaling factor
      - debian/patches/CVE-2014-6054.patch: prevent zero scaling factor in
        libvncserver/rfbserver.c, check for integer overflow in
        libvncserver/scale.c.
      - CVE-2014-6054
    * SECURITY UPDATE: denial of service and possible code execution via
      stack overflows in File Transfer feature
      - debian/patches/CVE-2014-6055.patch: check sizes in
        libvncserver/rfbserver.c.
      - CVE-2014-6055
    * SECURITY UPDATE: denial of service and possible code execution via
      integer overflow and lack of malloc error handling in
      MallocFrameBuffer()
      - debian/patches/CVE-2014-6051-6052.patch: check size and handle
        return code in libvncclient/vncviewer.c, handle return code in
        libvncclient/rfbproto.c.
      - CVE-2014-6051
      - CVE-2014-6052
    * SECURITY UPDATE: denial of service via large ClientCutText message
      - debian/patches/CVE-2014-6053.patch: check malloc result in
        libvncserver/rfbserver.c.
      - CVE-2014-6053
    * SECURITY UPDATE: denial of service via zero scaling factor
      - debian/patches/CVE-2014-6054.patch: prevent zero scaling factor in
        libvncserver/rfbserver.c, check for integer overflow in
        libvncserver/scale.c.
      - CVE-2014-6054
    * SECURITY UPDATE: denial of service and possible code execution via
      stack overflows in File Transfer feature
      - debian/patches/CVE-2014-6055.patch: check sizes in
        libvncserver/rfbserver.c.
      - CVE-2014-6055

  Debian fixed them too

  Changelog entries since current vivid version 0.9.9+dfsg-6ubuntu1:

  libvncserver (0.9.9+dfsg-6.1) unstable; urgency=medium

    * Non-maintainer upload.
    * CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055:
      Multiple issues in libVNCserver -- cherry picking targeted fixed from
      upstream (Closes: #762745)

   -- Tobias Frost <tobi at debian.org>  Sun, 23 Nov 2014 16:19:53 +0100

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvncserver/+bug/1399584/+subscriptions



More information about the Ubuntu-sponsors mailing list