{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"libvncserver security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for libvncserver is now available for openEuler-24.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"libvncserver is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to &quot;export&quot; a frame buffer via net: you set up a server and can connect to it via VNC viewers. If the server supports WebSockets (which LibVNCServer does), you can also connect using an in-browser VNC viewer like noVNC. It is already in wide use for administration, but it is not that easy to program a server yourself.\n\nSecurity Fix(es):\n\nLibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.(CVE-2026-32853)\n\nLibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.(CVE-2026-32854)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for libvncserver is now available for openEuler-24.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"libvncserver",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2026-2253",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2253"
			},
			{
				"summary":"CVE-2026-32853",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-32853&packageName=libvncserver"
			},
			{
				"summary":"CVE-2026-32854",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-32854&packageName=libvncserver"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32853"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32854"
			},
			{
				"summary":"openEuler-SA-2026-2253 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2026/csaf-openeuler-sa-2026-2253.json"
			}
		],
		"title":"An update for libvncserver is now available for openEuler-24.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2026-05-09T20:35:13+08:00",
			"revision_history":[
				{
					"date":"2026-05-09T20:35:13+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-05-09T20:35:13+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-05-09T20:35:13+08:00",
			"id":"openEuler-SA-2026-2253",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"openEuler-24.03-LTS-SP1",
									"name":"openEuler-24.03-LTS-SP1"
								},
								"name":"openEuler-24.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-0.9.13-4.oe2403sp1.aarch64.rpm",
									"name":"libvncserver-0.9.13-4.oe2403sp1.aarch64.rpm"
								},
								"name":"libvncserver-0.9.13-4.oe2403sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64.rpm",
									"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64.rpm"
								},
								"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64.rpm",
									"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64.rpm"
								},
								"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-devel-0.9.13-4.oe2403sp1.aarch64.rpm",
									"name":"libvncserver-devel-0.9.13-4.oe2403sp1.aarch64.rpm"
								},
								"name":"libvncserver-devel-0.9.13-4.oe2403sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-0.9.13-4.oe2403sp1.src.rpm",
									"name":"libvncserver-0.9.13-4.oe2403sp1.src.rpm"
								},
								"name":"libvncserver-0.9.13-4.oe2403sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-0.9.13-4.oe2403sp1.x86_64.rpm",
									"name":"libvncserver-0.9.13-4.oe2403sp1.x86_64.rpm"
								},
								"name":"libvncserver-0.9.13-4.oe2403sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64.rpm",
									"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64.rpm"
								},
								"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64.rpm",
									"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64.rpm"
								},
								"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP1"
									},
									"product_id":"libvncserver-devel-0.9.13-4.oe2403sp1.x86_64.rpm",
									"name":"libvncserver-devel-0.9.13-4.oe2403sp1.x86_64.rpm"
								},
								"name":"libvncserver-devel-0.9.13-4.oe2403sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-0.9.13-4.oe2403sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.aarch64",
					"name":"libvncserver-0.9.13-4.oe2403sp1.aarch64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64",
					"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64",
					"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-devel-0.9.13-4.oe2403sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-devel-0.9.13-4.oe2403sp1.aarch64",
					"name":"libvncserver-devel-0.9.13-4.oe2403sp1.aarch64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-0.9.13-4.oe2403sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.src",
					"name":"libvncserver-0.9.13-4.oe2403sp1.src as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-0.9.13-4.oe2403sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.x86_64",
					"name":"libvncserver-0.9.13-4.oe2403sp1.x86_64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64",
					"name":"libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64",
					"name":"libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP1",
				"product_reference":"libvncserver-devel-0.9.13-4.oe2403sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP1:libvncserver-devel-0.9.13-4.oe2403sp1.x86_64",
					"name":"libvncserver-devel-0.9.13-4.oe2403sp1.x86_64 as a component of openEuler-24.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-32853",
			"notes":[
				{
					"text":"LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.aarch64",
					"openEuler-24.03-LTS-SP1:libvncserver-debuginfo-0.9.13-4.oe2403sp1.aarch64",
					"openEuler-24.03-LTS-SP1:libvncserver-debugsource-0.9.13-4.oe2403sp1.aarch64",
					"openEuler-24.03-LTS-SP1:libvncserver-devel-0.9.13-4.oe2403sp1.aarch64",
					"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.src",
					"openEuler-24.03-LTS-SP1:libvncserver-0.9.13-4.oe2403sp1.x86_64",
					"openEuler-24.03-LTS-SP1:libvncserver-debuginfo-0.9.13-4.oe2403sp1.x86_64",
					"openEuler-24.03-LTS-SP1:libvncserver-debugsource-0.9.13-4.oe2403sp1.x86_64",
					"openEuler-24.03-LTS-SP1:libvncserver-devel-0.9.13-4.oe2403sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"libvncserver security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2253"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-32853"
		},
		{
			"cve":"CVE-2026-32854",
			"notes":[
				{
					"text":"LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"libvncserver security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2253"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-32854"
		}
	]
}