First published: Mon Mar 17 2025(Updated: )
Important: tigervnc security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tigervnc | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-debuginfo | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-icons | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-license | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-applet | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-minimal | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-module | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-debuginfo | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-minimal | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-module | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-debuginfo | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-minimal | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
redhat/tigervnc-server-module | <1.8.0-36.el7_9 | 1.8.0-36.el7_9 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:2861 is classified as critical.
To fix RHSA-2025:2861, upgrade to the latest version of TigerVNC, specifically 1.8.0-36.el7_9.
RHSA-2025:2861 addresses multiple vulnerabilities, including issues that might allow unauthorized access.
The affected packages include tigervnc, tigervnc-server, and their related components on Red Hat systems.
Currently, the best course of action for RHSA-2025:2861 is to apply the available patch or update.