SUSE: 2020:0266-1 important: tigervnc
Summary
This update for tigervnc provides the following fixes: Security issues fixed: - CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856). - CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250). - CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858). - CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251). - CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860). Non-security issue fixed: - Make sure CN in generated certificate doesn't exceed 64 characters. (bnc#1041847) - Change with-vnc-key.sh to generate TLS certificate using current hostname to keep it short. (bsc#1041847) - Disable MIT-SHM extension when running under user "vnc". (bsc#1053373) ...
Read the Full AdvisoryReferences
#1041847 #1053373 #1159856 #1159858 #1159860
#1160250 #1160251 #1160937
Cross- CVE-2019-15691 CVE-2019-15692 CVE-2019-15693
CVE-2019-15694 CVE-2019-15695
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
https://www.suse.com/security/cve/CVE-2019-15691.html
https://www.suse.com/security/cve/CVE-2019-15692.html
https://www.suse.com/security/cve/CVE-2019-15693.html
https://www.suse.com/security/cve/CVE-2019-15694.html
https://www.suse.com/security/cve/CVE-2019-15695.html
https://bugzilla.suse.com/1041847
https://bugzilla.suse.com/1053373
https://bugzilla.suse.com/1159856
https://bugzilla.suse.com/1159858
https://bugzilla.suse.com/1159860
https://bugzilla.suse.com/1160250
https://bugzilla.suse.com/1160251
https://bugzilla.suse.com/1160937