Security update for LibVNCServer

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712).
- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711).

This update was imported from the SUSE:SLE-12:Update update project.

Fixed bugs
bnc#1017712
VUL-0: CVE-2016-9942: LibVNCServer,x11vnc: Heap-based buffer overflow via crafted FramebufferUpdate message with the Ultra type tile
bnc#1017711
VUL-0: CVE-2016-9941: LibVNCServer,x11vnc: Heap-based buffer overflow via crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area
bnc#1081493
VUL-0: CVE-2018-7225: LibVNCServer: rfbserver.c: rfbProcessClientNormalMessage() case rfbClientCutText doesnt sanitize msg.cct.length
Selected Binaries
openSUSE Build Service is sponsored by