Revision Date: | 2020-01-22 | Version: | 1 |
Title: | Security update for tigervnc (Important) |
Description: |
This update for tigervnc fixes the following issues:
- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856). - CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250). - CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858). - CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251). - CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1159856 1159858 1159860 1160250 1160251 1160937 CVE-2019-15691 CVE-2019-15692 CVE-2019-15693 CVE-2019-15694 CVE-2019-15695
|
Platform(s): | SUSE Linux Enterprise Server 12 SP3-TERADATA
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed AND Package Information
libXvnc1-1.6.0-18.28.1 is installed
OR tigervnc-1.6.0-18.28.1 is installed
OR xorg-x11-Xvnc-1.6.0-18.28.1 is installed
|