vulnerability
Rocky Linux: CVE-2025-49175: tigervnc (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:P/I:N/A:C) | Jul 29, 2025 | Jul 31, 2025 | Oct 7, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:P/I:N/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Oct 7, 2025
Description
A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.
Solutions
rocky-upgrade-tigervncrocky-upgrade-tigervnc-debuginforocky-upgrade-tigervnc-debugsourcerocky-upgrade-tigervnc-serverrocky-upgrade-tigervnc-server-debuginforocky-upgrade-tigervnc-server-minimalrocky-upgrade-tigervnc-server-minimal-debuginforocky-upgrade-tigervnc-server-modulerocky-upgrade-tigervnc-server-module-debuginforocky-upgrade-xorg-x11-server-commonrocky-upgrade-xorg-x11-server-debuginforocky-upgrade-xorg-x11-server-debugsourcerocky-upgrade-xorg-x11-server-develrocky-upgrade-xorg-x11-server-xdmxrocky-upgrade-xorg-x11-server-xdmx-debuginforocky-upgrade-xorg-x11-server-xephyrrocky-upgrade-xorg-x11-server-xephyr-debuginforocky-upgrade-xorg-x11-server-xnestrocky-upgrade-xorg-x11-server-xnest-debuginforocky-upgrade-xorg-x11-server-xorgrocky-upgrade-xorg-x11-server-xorg-debuginforocky-upgrade-xorg-x11-server-xvfbrocky-upgrade-xorg-x11-server-xvfb-debuginforocky-upgrade-xorg-x11-server-xwaylandrocky-upgrade-xorg-x11-server-xwayland-debuginforocky-upgrade-xorg-x11-server-xwayland-debugsourcerocky-upgrade-xorg-x11-server-xwayland-devel
References
- CVE-2025-49175
- https://attackerkb.com/topics/CVE-2025-49175
- CWE-125
- URL-https://errata.rockylinux.org/RLSA-2025:9303
- URL-https://errata.rockylinux.org/RLSA-2025:9304
- URL-https://errata.rockylinux.org/RLSA-2025:9305
- URL-https://errata.rockylinux.org/RLSA-2025:9306
- URL-https://errata.rockylinux.org/RLSA-2025:9392
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.