vulnerability
Rocky Linux: CVE-2025-49180: tigervnc (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Jul 29, 2025 | Jul 31, 2025 | Oct 7, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Oct 7, 2025
Description
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
Solutions
rocky-upgrade-tigervncrocky-upgrade-tigervnc-debuginforocky-upgrade-tigervnc-debugsourcerocky-upgrade-tigervnc-serverrocky-upgrade-tigervnc-server-debuginforocky-upgrade-tigervnc-server-minimalrocky-upgrade-tigervnc-server-minimal-debuginforocky-upgrade-tigervnc-server-modulerocky-upgrade-tigervnc-server-module-debuginforocky-upgrade-xorg-x11-server-commonrocky-upgrade-xorg-x11-server-debuginforocky-upgrade-xorg-x11-server-debugsourcerocky-upgrade-xorg-x11-server-develrocky-upgrade-xorg-x11-server-xdmxrocky-upgrade-xorg-x11-server-xdmx-debuginforocky-upgrade-xorg-x11-server-xephyrrocky-upgrade-xorg-x11-server-xephyr-debuginforocky-upgrade-xorg-x11-server-xnestrocky-upgrade-xorg-x11-server-xnest-debuginforocky-upgrade-xorg-x11-server-xorgrocky-upgrade-xorg-x11-server-xorg-debuginforocky-upgrade-xorg-x11-server-xvfbrocky-upgrade-xorg-x11-server-xvfb-debuginforocky-upgrade-xorg-x11-server-xwaylandrocky-upgrade-xorg-x11-server-xwayland-debuginforocky-upgrade-xorg-x11-server-xwayland-debugsourcerocky-upgrade-xorg-x11-server-xwayland-devel
References
- CVE-2025-49180
- https://attackerkb.com/topics/CVE-2025-49180
- CWE-190
- URL-https://errata.rockylinux.org/RLSA-2025:9303
- URL-https://errata.rockylinux.org/RLSA-2025:9304
- URL-https://errata.rockylinux.org/RLSA-2025:9305
- URL-https://errata.rockylinux.org/RLSA-2025:9306
- URL-https://errata.rockylinux.org/RLSA-2025:9392
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.