Bugzilla – Bug 1123828
VUL-0: CVE-2018-20749: LibVNCServer: heap out-of-bounds write vulnerability in libvncserver/rfbserver.c
Last modified: 2019-04-29 10:12:10 UTC
CVE-2018-20749 LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20749 https://www.openwall.com/lists/oss-security/2018/12/10/8 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20749.html https://github.com/LibVNC/libvncserver/issues/273 https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
The patch for CVE-2018-15127 did not fix completely that issue and thus this CVE was created. A fix is already available at [1] All our codestreams contain this patch and are also affected. [1] https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
0.9.12 submitted into develproject.
Packages submitted into 15,12,11/LibVNCServer.
I believe all fixed.
SUSE-SU-2019:0283-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: SUSE Linux Enterprise Workstation Extension 15 (src): LibVNCServer-0.9.10-4.6.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15 (src): LibVNCServer-0.9.10-4.6.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): LibVNCServer-0.9.10-4.6.1
SUSE-SU-2019:0313-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: SUSE OpenStack Cloud 7 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-SP4 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-SP3 (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): LibVNCServer-0.9.9-17.11.1 SUSE Linux Enterprise Server 12-LTSS (src): LibVNCServer-0.9.9-17.11.1 SUSE Enterprise Storage 4 (src): LibVNCServer-0.9.9-17.11.1
SUSE-SU-2019:13952-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): LibVNCServer-0.9.1-160.9.1 SUSE Linux Enterprise Server 11-SP4 (src): LibVNCServer-0.9.1-160.9.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): LibVNCServer-0.9.1-160.9.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): LibVNCServer-0.9.1-160.9.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): LibVNCServer-0.9.1-160.9.1
openSUSE-SU-2019:0196-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: openSUSE Leap 15.0 (src): LibVNCServer-0.9.10-lp150.3.6.1
openSUSE-SU-2019:0200-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: openSUSE Leap 42.3 (src): LibVNCServer-0.9.9-16.9.1
done
SUSE-SU-2019:0313-2: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1123823,1123828,1123832 CVE References: CVE-2018-20748,CVE-2018-20749,CVE-2018-20750 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): LibVNCServer-0.9.9-17.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.