MGASA-2019-0368

Source
https://advisories.mageia.org/MGASA-2019-0368.html
Import Source
https://advisories.mageia.org/MGASA-2019-0368.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0368
Related
Published
2019-12-06T14:15:42Z
Modified
2019-12-06T13:43:55Z
Summary
Updated libvncserver packages fix security vulnerability
Details

Updated libvncserver packages fix security vulnerability:

LibVNC contained a memory leak in VNC server code, which allowed an attacker to read stack memory and could be abused for information disclosure. Combined with another vulnerability, it could be used to leak stack memory and bypass ASLR. This attack appeared to be exploitable via network connectivity (CVE-2019-15681).

References
Credits

Affected packages