openSUSE-SU-2020:0087-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:0087-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:0087-1
Related
Published
2020-01-21T15:12:09Z
Modified
2020-01-21T15:12:09Z
Summary
Security update for tigervnc
Details

This update for tigervnc fixes the following issues:

  • CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
  • CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
  • CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
  • CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
  • CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).

This update was imported from the SUSE:SLE-15-SP1:Update update project.

References

Affected packages

openSUSE:Leap 15.1 / tigervnc

Package

Name
tigervnc
Purl
pkg:rpm/opensuse/tigervnc&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.0-lp151.4.3.1

Ecosystem specific

{
    "binaries": [
        {
            "xorg-x11-Xvnc": "1.9.0-lp151.4.3.1",
            "xorg-x11-Xvnc-novnc": "1.9.0-lp151.4.3.1",
            "libXvnc-devel": "1.9.0-lp151.4.3.1",
            "tigervnc-x11vnc": "1.9.0-lp151.4.3.1",
            "xorg-x11-Xvnc-module": "1.9.0-lp151.4.3.1",
            "libXvnc1": "1.9.0-lp151.4.3.1",
            "tigervnc": "1.9.0-lp151.4.3.1",
            "xorg-x11-Xvnc-java": "1.9.0-lp151.4.3.1"
        }
    ]
}