Package: libvncserver / 0.9.9+dfsg-1+deb7u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| libvncserver | 0.9.9+dfsg-1+deb7u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| ignore_webclients.patch | (download) |
Makefile.am |
4 2 + 2 - 0 ! |
do not consider webclients directory during build phase |
| no_x11vnc_subdir.patch | (download) |
Makefile.am |
6 1 + 5 - 0 ! |
do not build x11vnc |
| format_string.patch | (download) |
test/encodingstest.c |
2 1 + 1 - 0 ! |
use format string argument with fprintf. |
| CVE 2014 6051.patch | (download) |
libvncclient/vncviewer.c |
20 19 + 1 - 0 ! |
fix integer overflow in mallocframebuffer() (cve-2014-6051) Promote integers to uint64_t to avoid integer overflow issue during frame buffer allocation for very large screen sizes |
| CVE 2014 6052.patch | (download) |
libvncclient/rfbproto.c |
10 7 + 3 - 0 ! |
check for mallocframebuffer() return value (cve-2014-6052) If MallocFrameBuffer() returns FALSE, frame buffer pointer is left to NULL. Subsequent writes into that buffer could lead to memory corruption, or even arbitrary code execution. |
| CVE 2014 6054.patch | (download) |
libvncserver/rfbserver.c |
14 14 + 0 - 0 ! |
do not accept a scaling factor of zero (cve-2014-6054) Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server. |
| CVE 2014 6055.patch | (download) |
libvncserver/rfbserver.c |
57 44 + 13 - 0 ! |
--- |
| CVE 2015 6053.patch | (download) |
libvncserver/rfbserver.c |
5 5 + 0 - 0 ! |
check malloc() return value (cve-2014-6053) Check malloc() return value on client->server ClientCutText message. Client can send up to 2**32-1 bytes of text, and such a large allocation is likely to fail in case of high memory pressure. This would in a server crash (write at address 0). |
