<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for libvncserver is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2255</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-09</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-09</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-09</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-09</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libvncserver security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libvncserver is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">libvncserver is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to &amp;quot;export&amp;quot; a frame buffer via net: you set up a server and can connect to it via VNC viewers. If the server supports WebSockets (which LibVNCServer does), you can also connect using an in-browser VNC viewer like noVNC. It is already in wide use for administration, but it is not that easy to program a server yourself.

Security Fix(es):

LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.(CVE-2026-32853)

LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.(CVE-2026-32854)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libvncserver is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libvncserver</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2255</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-32853</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-32854</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-32853</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-32854</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="libvncserver-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-0.9.13-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-debuginfo-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-debuginfo-0.9.13-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-debugsource-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-debugsource-0.9.13-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-devel-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-devel-0.9.13-4.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="libvncserver-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-0.9.13-4.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="libvncserver-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-0.9.13-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-debuginfo-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-debuginfo-0.9.13-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-debugsource-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-debugsource-0.9.13-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libvncserver-devel-0.9.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4" EPOL="true">libvncserver-devel-0.9.13-4.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.</Note>
		</Notes>
		<ReleaseDate>2026-05-09</ReleaseDate>
		<CVE>CVE-2026-32853</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libvncserver security update</Description>
				<DATE>2026-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2255</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.</Note>
		</Notes>
		<ReleaseDate>2026-05-09</ReleaseDate>
		<CVE>CVE-2026-32854</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libvncserver security update</Description>
				<DATE>2026-05-09</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2255</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>