Amazon Linux 2 Security Advisory: ALAS-2024-2558
Advisory Release Date: 2024-05-23 22:04 Pacific
Advisory Updated Date: 2024-05-29 12:00 Pacific
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. (CVE-2023-0494)
Affected Packages:
tigervnc
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update tigervnc to update your system.
aarch64:
tigervnc-1.8.0-24.amzn2.0.2.aarch64
tigervnc-server-1.8.0-24.amzn2.0.2.aarch64
tigervnc-server-minimal-1.8.0-24.amzn2.0.2.aarch64
tigervnc-server-module-1.8.0-24.amzn2.0.2.aarch64
tigervnc-debuginfo-1.8.0-24.amzn2.0.2.aarch64
i686:
tigervnc-1.8.0-24.amzn2.0.2.i686
tigervnc-server-1.8.0-24.amzn2.0.2.i686
tigervnc-server-minimal-1.8.0-24.amzn2.0.2.i686
tigervnc-server-module-1.8.0-24.amzn2.0.2.i686
tigervnc-debuginfo-1.8.0-24.amzn2.0.2.i686
noarch:
tigervnc-server-applet-1.8.0-24.amzn2.0.2.noarch
tigervnc-license-1.8.0-24.amzn2.0.2.noarch
tigervnc-icons-1.8.0-24.amzn2.0.2.noarch
src:
tigervnc-1.8.0-24.amzn2.0.2.src
x86_64:
tigervnc-1.8.0-24.amzn2.0.2.x86_64
tigervnc-server-1.8.0-24.amzn2.0.2.x86_64
tigervnc-server-minimal-1.8.0-24.amzn2.0.2.x86_64
tigervnc-server-module-1.8.0-24.amzn2.0.2.x86_64
tigervnc-debuginfo-1.8.0-24.amzn2.0.2.x86_64