This is an automated email from the ASF dual-hosted git repository.

mjumper pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/guacamole-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 080121b3 Deploy announcement of vulnerability fixed in 1.5.4.
080121b3 is described below

commit 080121b3e20ec2dad2bd91a7d373f551aa438715
Author: Michael Jumper <[email protected]>
AuthorDate: Tue Dec 19 11:15:55 2023 -0800

    Deploy announcement of vulnerability fixed in 1.5.4.
---
 content/security/index.html | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)

diff --git a/content/security/index.html b/content/security/index.html
index f13e1c61..a35658fa 100644
--- a/content/security/index.html
+++ b/content/security/index.html
@@ -439,6 +439,28 @@ latest would give you an updated image.</p>
 <p>No, CVE-2021-44228 does not affect Apache Guacamole. Guacamole uses
 <a href="http://logback.qos.ch/";>Logback</a> as its logging backend, not 
Log4j.</p>
 
+<h2 id="fixed-in-apache-guacamole-154">Fixed in Apache Guacamole 1.5.4</h2>
+<ul>
+    
+        <li>
+            <h3 id="CVE-2023-43826">
+                Integer overflow in handling of VNC image buffers
+                (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43826";>CVE-2023-43826</a>)
+            </h3>
+            <p>Apache Guacamole 1.5.3 and older do not consistently ensure 
that values
+received from a VNC server will not result in integer overflow. If a user
+connects to a malicious or compromised VNC server, specially crafted data could
+result in memory corruption, possibly allowing arbitrary code to be executed
+with the privileges of the running guacd process.</p>
+
+<p>Acknowledgements: We would like to thank Joseph Surin and Matt Jones 
(Elttam)
+for reporting this issue.</p>
+
+
+        </li>
+    
+</ul>
+
 <h2 id="fixed-in-apache-guacamole-152">Fixed in Apache Guacamole 1.5.2</h2>
 <ul>
     

Reply via email to