RedHat: RHSA-2020-1497:01 Moderate: tigervnc security update
An update for tigervnc is now available for Red Hat Enterprise Linux 8
Summary
Virtual Network Computing (VNC) is a remote display system which allows
users to view a computing desktop environment not only on the machine where
it is running, but from anywhere on the Internet and from a wide variety of
machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* tigervnc: Stack use-after-return due to incorrect usage of stack memory
in ZRLEDecoder (CVE-2019-15691)
* tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to
incorrect value checks (CVE-2019-15692)
* tigervnc: Heap buffer overflow in TightDecoder::FilterGradient
(CVE-2019-15693)
* tigervnc: Heap buffer overflow in DecodeManager::decodeRect
(CVE-2019-15694)
* tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
(CVE-2019-15695)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2019-15691 https://access.redhat.com/security/cve/CVE-2019-15692 https://access.redhat.com/security/cve/CVE-2019-15693 https://access.redhat.com/security/cve/CVE-2019-15694 https://access.redhat.com/security/cve/CVE-2019-15695 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux AppStream (v. 8):
Source:
tigervnc-1.9.0-14.el8_1.src.rpm
aarch64:
tigervnc-1.9.0-14.el8_1.aarch64.rpm
tigervnc-debuginfo-1.9.0-14.el8_1.aarch64.rpm
tigervnc-debugsource-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-debuginfo-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-minimal-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-minimal-debuginfo-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-module-1.9.0-14.el8_1.aarch64.rpm
tigervnc-server-module-debuginfo-1.9.0-14.el8_1.aarch64.rpm
noarch:
tigervnc-icons-1.9.0-14.el8_1.noarch.rpm
tigervnc-license-1.9.0-14.el8_1.noarch.rpm
tigervnc-server-applet-1.9.0-14.el8_1.noarch.rpm
ppc64le:
tigervnc-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-debuginfo-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-debugsource-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-debuginfo-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-minimal-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-minimal-debuginfo-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-module-1.9.0-14.el8_1.ppc64le.rpm
tigervnc-server-module-debuginfo-1.9.0-14.el8_1.ppc64le.rpm
s390x:
tigervnc-1.9.0-14.el8_1.s390x.rpm
tigervnc-debuginfo-1.9.0-14.el8_1.s390x.rpm
tigervnc-debugsource-1.9.0-14.el8_1.s390x.rpm
tigervnc-server-1.9.0-14.el8_1.s390x.rpm
tigervnc-server-debuginfo-1.9.0-14.el8_1.s390x.rpm
tigervnc-server-minimal-1.9.0-14.el8_1.s390x.rpm
tigervnc-server-minimal-debuginfo-1.9.0-14.el8_1.s390x.rpm
x86_64:
tigervnc-1.9.0-14.el8_1.x86_64.rpm
tigervnc-debuginfo-1.9.0-14.el8_1.x86_64.rpm
tigervnc-debugsource-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-debuginfo-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-minimal-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-minimal-debuginfo-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-module-1.9.0-14.el8_1.x86_64.rpm
tigervnc-server-module-debuginfo-1.9.0-14.el8_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Bugs Fixed
1789527 - CVE-2019-15692 tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks
1789908 - CVE-2019-15691 tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder
1790313 - CVE-2019-15693 tigervnc: Heap buffer overflow in TightDecoder::FilterGradient
1790315 - CVE-2019-15694 tigervnc: Heap buffer overflow in DecodeManager::decodeRect
1790318 - CVE-2019-15695 tigervnc: Stack buffer overflow in CMsgReader::readSetCursor