ELSA-2024-9540

ELSA-2024-9540 - tigervnc security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2024-11-13

Description


[1.13.1-14]
- Fix CVE-2024-9632: xorg-x11-server: heap-based buffer overflow privilege escalation vulnerability
Resolves: RHEL-61999


Related CVEs


CVE-2024-9632

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) tigervnc-1.13.1-14.el8_10.src.rpmc1abe266ab98ad4fd2eadf7b60a8e253-ol8_aarch64_appstream
tigervnc-1.13.1-14.el8_10.aarch64.rpmd163ebd3326c0c95474cf87a9d43739a-ol8_aarch64_appstream
tigervnc-icons-1.13.1-14.el8_10.noarch.rpme913fffdc0a2fbc63ca2bdc6c4f8a072-ol8_aarch64_appstream
tigervnc-license-1.13.1-14.el8_10.noarch.rpmd29caa3e041f28e020b4765e219717dc-ol8_aarch64_appstream
tigervnc-selinux-1.13.1-14.el8_10.noarch.rpm5ad0d87695246538d61f3fe6938e1b07-ol8_aarch64_appstream
tigervnc-server-1.13.1-14.el8_10.aarch64.rpm2e0879374875aa8e67882aaab8bc8b7d-ol8_aarch64_appstream
tigervnc-server-minimal-1.13.1-14.el8_10.aarch64.rpmda500f1083890671bfa511e4d0452c2d-ol8_aarch64_appstream
tigervnc-server-module-1.13.1-14.el8_10.aarch64.rpmdf5f6b71895d7ef8e9dc9b4de81c7f1c-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) tigervnc-1.13.1-14.el8_10.src.rpmc1abe266ab98ad4fd2eadf7b60a8e253-ol8_x86_64_appstream
tigervnc-1.13.1-14.el8_10.x86_64.rpm7fe8788329dc1e63076fb66deb0017e4-ol8_x86_64_appstream
tigervnc-icons-1.13.1-14.el8_10.noarch.rpme913fffdc0a2fbc63ca2bdc6c4f8a072-ol8_x86_64_appstream
tigervnc-license-1.13.1-14.el8_10.noarch.rpmd29caa3e041f28e020b4765e219717dc-ol8_x86_64_appstream
tigervnc-selinux-1.13.1-14.el8_10.noarch.rpm5ad0d87695246538d61f3fe6938e1b07-ol8_x86_64_appstream
tigervnc-server-1.13.1-14.el8_10.x86_64.rpm9033e83ba2a8f54dd72ff070b9e58d96-ol8_x86_64_appstream
tigervnc-server-minimal-1.13.1-14.el8_10.x86_64.rpmc12e7fb24a241b8dc7d97f8aff645fc9-ol8_x86_64_appstream
tigervnc-server-module-1.13.1-14.el8_10.x86_64.rpmf4fc398ec22fb34f1260c1588158cdd6-ol8_x86_64_appstream


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete