Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-317-01
HistoryNov 13, 2023 - 7:27 p.m.

[slackware-security] tigervnc

2023-11-1319:27:10
Slackware Linux Project
www.slackware.com
25
tigervnc
slackware 15.0
-current
security fix
cve-2022-3550
cve-2022-3551
cve-2022-3553
cve-2022-4283
cve-2022-46340
cve-2022-46341
cve-2022-46342
cve-2022-46343
cve-2022-46344
cve-2023-0494
cve-2023-1393
cve-2023-5367
cve-2023-5380

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.036 Low

EPSS

Percentile

91.7%

New tigervnc packages are available for Slackware 15.0 and -current to fix
security issues.

Here are the details from the Slackware 15.0 ChangeLog:

extra/tigervnc/tigervnc-1.12.0-i586-4_slack15.0.txz: Rebuilt.
Recompiled against xorg-server-1.20.14, including patches for several
security issues. Thanks to marav.
For more information, see:
https://vulners.com/cve/CVE-2022-3550
https://vulners.com/cve/CVE-2022-3551
https://vulners.com/cve/CVE-2022-3553
https://vulners.com/cve/CVE-2022-4283
https://vulners.com/cve/CVE-2022-46340
https://vulners.com/cve/CVE-2022-46341
https://vulners.com/cve/CVE-2022-46342
https://vulners.com/cve/CVE-2022-46343
https://vulners.com/cve/CVE-2022-46344
https://vulners.com/cve/CVE-2023-0494
https://vulners.com/cve/CVE-2023-1393
https://vulners.com/cve/CVE-2023-5367
https://vulners.com/cve/CVE-2023-5380
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/tigervnc/tigervnc-1.12.0-i586-4_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/tigervnc/tigervnc-1.12.0-x86_64-4_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/tigervnc/tigervnc-1.13.1-i586-2.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/tigervnc/tigervnc-1.13.1-x86_64-2.txz

MD5 signatures:

Slackware 15.0 package:
6cdaa7fbfc1f746d489ad8e1cc450df0 tigervnc-1.12.0-i586-4_slack15.0.txz

Slackware x86_64 15.0 package:
24d9849bbbd851f5c3f4a5da4f872668 tigervnc-1.12.0-x86_64-4_slack15.0.txz

Slackware -current package:
c8028eaff3f7053f900d840f0943b06a tigervnc-1.13.1-i586-2.txz

Slackware x86_64 -current package:
52cdcf1c405f094ce9a2d2482ca06a38 tigervnc-1.13.1-x86_64-2.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg tigervnc-1.12.0-i586-4_slack15.0.txz

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.036 Low

EPSS

Percentile

91.7%