SB20260427125 - SUSE update for LibVNCServer
Published: April 27, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2026-32853)
The vulnerability allows a remote attacker to disclose sensitive information or cause a denial of service.
The vulnerability exists due to out-of-bounds read in the HandleUltraZipBPP function in src/libvncclient/ultra.c when processing UltraZip-encoded FramebufferUpdate messages. A remote attacker can send a specially crafted FramebufferUpdate message with an attacker-controlled subrectangle count to disclose sensitive information or cause a denial of service.
UltraZip encoding is enabled by default in LibVNCClient, and no authentication is required on the server side when using rfbSecTypeNone.
2) NULL pointer dereference (CVE-ID: CVE-2026-32854)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to null pointer dereference in httpProcessInput in src/libvncserver/httpd.c when handling malformed CONNECT or GET requests to the HTTP proxy handlers. A remote attacker can send a specially crafted request to cause a denial of service.
Only configurations with both the non-default -httpd and -enablehttpproxy options enabled are vulnerable.
Remediation
Install update from vendor's website.