-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-c5b679877e 2021-03-10 00:25:11.065319 --------------------------------------------------------------------------------
Name : x11vnc Product : Fedora 32 Version : 0.9.16 Release : 3.fc32 URL : https://github.com/LibVNC/x11vnc Summary : VNC server for the current X11 session Description : What WinVNC is to Windows x11vnc is to X Window System, i.e. a server which serves the current X Window System desktop via RFB (VNC) protocol to the user.
Based on the ideas of x0rfbserver and on LibVNCServer it has evolved into a versatile and productive while still easy to use program.
-------------------------------------------------------------------------------- Update Information:
This release fixes an insecure permissins of shared memory semgentes created by an x11vnc server. Previously the segments were readable and writable for any local user. Now they are accessible only to the user who executed the x11vnc server. -------------------------------------------------------------------------------- ChangeLog:
* Mon Mar 1 2021 Petr Pisar ppisar@redhat.com - 0.9.16-3 - Fix CVE-2020-29074 (insecure permissions on a shared memory) (bug #1933603) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1933602 - CVE-2020-29074 x11vnc: insecure permissions on shm https://bugzilla.redhat.com/show_bug.cgi?id=1933602 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-c5b679877e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------