Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tigervnc-server | Distribution: CentOS |
Version: 1.14.0 | Vendor: CentOS |
Release: 3.el9 | Build date: Wed Sep 4 09:05:25 2024 |
Group: Unspecified | Build host: x86-02.stream.rdu2.redhat.com |
Size: 598733 | Source RPM: tigervnc-1.14.0-3.el9.src.rpm |
Packager: builder@centos.org | |
Url: http://www.tigervnc.com | |
Summary: A TigerVNC server |
The VNC system allows you to access the same desktop from a wide variety of platforms. This package includes set of utilities which make usage of TigerVNC server more user friendly. It also contains x0vncserver program which can export your active X session.
GPL-2.0-or-later
* Wed Sep 04 2024 Jan Grulich <jgrulich@redhat.com> - 1.14.0-3 - Move old log to log.old if present (fix patch) Resolves: RHEL-54294 * Fri Aug 23 2024 Jan Grulich <jgrulich@redhat.com> - 1.14.0-2 - 1.14.0 Resolves: RHEL-45316 - Move old log to log.old if present Resolves: RHEL-54294 - Fix shared memory leak Resolves: RHEL-55768 * Mon Aug 05 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-11 - vncsession: use /bin/sh if the user shell is not set Resolves: RHEL-50679 * Tue May 28 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-10 - vncconfig: add option to force view-only remote client connections Resolves: RHEL-12144 * Tue Apr 16 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-9 - Fix CVE-2024-31080 tigervnc: xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents Resolves: RHEL-30756 - Fix CVE-2024-31083 tigervnc: xorg-x11-server: User-after-free in ProcRenderAddGlyphs Resolves: RHEL-30768 - Fix CVE-2024-31081 tigervnc: xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice Resolves: RHEL-30762 * Wed Feb 07 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-8 - Fix copy/paste error in the DeviceStateNotify Resolves: RHEL-20533 * Mon Jan 22 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-7 - Fix CVE-2024-21886 tigervnc: xorg-x11-server: heap buffer overflow in DisableDevice Resolves: RHEL-20389 - Fix CVE-2024-21885 tigervnc: xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent Resolves: RHEL-20383 - Fix CVE-2024-0229 tigervnc: xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access Resolves: RHEL-20533 - Fix CVE-2023-6816 tigervnc: xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer Resolves: RHEL-21213 * Mon Jan 08 2024 Jan Grulich <jgrulich@redhat.com> - 1.13.1-6 - Use dup() to get available file descriptor when using -inetd option Resolves: RHEL-19858 * Mon Dec 18 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-5 - Fix CVE-2023-6377 tigervnc: xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions Resolves: RHEL-18414 - Fix CVE-2023-6478 tigervnc: xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty Resolves: RHEL-18426 * Wed Nov 01 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-4 - Fix CVE-2023-5380 tigervnc: xorg-x11-server: Use-after-free bug in DestroyWindow Resolves: RHEL-15237 - Fix CVE-2023-5367 tigervnc: xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty Resolves: RHEL-15249 * Mon Oct 09 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-3 - Support username alias in PlainUsers Resolves: RHEL-8430 * Tue Apr 11 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-2 - xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability Resolves: bz#2180310 * Tue Mar 21 2023 Jan Grulich <jgrulich@redhat.com> - 1.13.1-1 - 1.13.1 Resolves: bz#2175732 * Tue Feb 21 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-12 - SELinux: allow vncsession create .vnc directory Resolves: bz#2164703 * Wed Feb 15 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-11 - Add sanity check when cleaning up keymap changes Resolves: bz#2169965 * Mon Feb 06 2023 Jan Grulich <jgrulich@redhat.com> - 1.12.0-10 - xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation Resolves: bz#2167061 * Tue Dec 20 2022 Tomas Popela <tpopela@redhat.com> - 1.12.0-9 - Rebuild for xorg-x11-server CVE-2022-46340 follow up fix * Fri Dec 16 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-8 - Rebuild for xorg-x11-server CVEs Resolves: CVE-2022-4283 (bz#2154234) Resolves: CVE-2022-46340 (bz#2154221) Resolves: CVE-2022-46341 (bz#2154224) Resolves: CVE-2022-46342 (bz#2154226) Resolves: CVE-2022-46343 (bz#2154228) Resolves: CVE-2022-46344 (bz#2154230) * Thu Dec 01 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-7 - x0vncserver: add new keysym in case we don't find matching keycode + actually apply the patch Resolves: bz#2119017 * Thu Dec 01 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-6 - x0vncserver: add new keysym in case we don't find matching keycode Resolves: bz#2119017 * Mon Oct 24 2022 Jan Grulich <jgrulich@redhat.com> - 1.12.0-5 - x0vncserver: fix ghost cursor in zaphod mode (better version) Resolves: bz#2119016
/etc/pam.d/tigervnc /etc/tigervnc/vncserver-config-defaults /etc/tigervnc/vncserver-config-mandatory /etc/tigervnc/vncserver.users /usr/bin/vncserver /usr/bin/x0vncserver /usr/lib/.build-id /usr/lib/.build-id/d6 /usr/lib/.build-id/d6/a50b8da849ab0c116b69b90fa35d023a6b0181 /usr/lib/.build-id/dc /usr/lib/.build-id/dc/7bff5d03bc2a1e468603b38a9762cae5a6b700 /usr/lib/systemd/system/vncserver@.service /usr/lib/systemd/system/xvnc.socket /usr/lib/systemd/system/xvnc@.service /usr/libexec/vncserver /usr/libexec/vncsession-restore /usr/libexec/vncsession-start /usr/sbin/vncsession /usr/share/doc/tigervnc/HOWTO.md /usr/share/man/man1/x0vncserver.1.gz /usr/share/man/man8/vncserver.8.gz /usr/share/man/man8/vncsession.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Nov 13 07:19:42 2024