ELSA-2024-10090

ELSA-2024-10090 - tigervnc security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2024-11-20

Description


[1.14.1-1]
- 1.14.1
Resolves: RHEL-66600
- Fix CVE-2024-9632: xorg-x11-server: heap-based buffer overflow privilege escalation vulnerability
Resolves: RHEL-62000


Related CVEs


CVE-2024-9632

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) tigervnc-1.14.1-1.el9_5.src.rpmdf736764e22a272b97c1210d2d13752c-ol9_aarch64_appstream
tigervnc-1.14.1-1.el9_5.aarch64.rpm35a85d5c9a9471e94b6dea632131eea8-ol9_aarch64_appstream
tigervnc-icons-1.14.1-1.el9_5.noarch.rpmcdf8112b7f45bbfb6a9a7995292ae719-ol9_aarch64_appstream
tigervnc-license-1.14.1-1.el9_5.noarch.rpmb7b845f5d7f6baa00de2ac82e206b743-ol9_aarch64_appstream
tigervnc-selinux-1.14.1-1.el9_5.noarch.rpm916ed79cebcf52ac152b646a2b2b5c36-ol9_aarch64_appstream
tigervnc-server-1.14.1-1.el9_5.aarch64.rpmc7475ad96b48297c30b4bacc1ae5a485-ol9_aarch64_appstream
tigervnc-server-minimal-1.14.1-1.el9_5.aarch64.rpm1ff46e04be5d927b96d67a87d42afee8-ol9_aarch64_appstream
tigervnc-server-module-1.14.1-1.el9_5.aarch64.rpm6ede8bc990c98adadb4c32be44bfd8d3-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) tigervnc-1.14.1-1.el9_5.src.rpmdf736764e22a272b97c1210d2d13752c-ol9_x86_64_appstream
tigervnc-1.14.1-1.el9_5.x86_64.rpmd393db94981446ca9ba5558abe21cd13-ol9_x86_64_appstream
tigervnc-icons-1.14.1-1.el9_5.noarch.rpmcdf8112b7f45bbfb6a9a7995292ae719-ol9_x86_64_appstream
tigervnc-license-1.14.1-1.el9_5.noarch.rpmb7b845f5d7f6baa00de2ac82e206b743-ol9_x86_64_appstream
tigervnc-selinux-1.14.1-1.el9_5.noarch.rpm916ed79cebcf52ac152b646a2b2b5c36-ol9_x86_64_appstream
tigervnc-server-1.14.1-1.el9_5.x86_64.rpm0c751092097ee238a279d47ed46ae746-ol9_x86_64_appstream
tigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpm9af1420b51de0777414b8595a551b2e6-ol9_x86_64_appstream
tigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm3fc763a74403d08a0cef41c45b8795d1-ol9_x86_64_appstream


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete