SUSE: 2020:1749-1 important: tigervnc
Summary
This update for tigervnc fixes the following issues: - CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856). - CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250). - CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858). - CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251). - CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860). Other bugs fixed: - Fix random connection freezes (bsc#1169952, bsc#1160249, bsc#1165680): Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterp...
Read the Full AdvisoryReferences
#1159856 #1159858 #1159860 #1160249 #1160250
#1160251 #1160937 #1165680 #1169952
Cross- CVE-2019-15691 CVE-2019-15692 CVE-2019-15693
CVE-2019-15694 CVE-2019-15695
Affected Products:
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4
https://www.suse.com/security/cve/CVE-2019-15691.html
https://www.suse.com/security/cve/CVE-2019-15692.html
https://www.suse.com/security/cve/CVE-2019-15693.html
https://www.suse.com/security/cve/CVE-2019-15694.html
https://www.suse.com/security/cve/CVE-2019-15695.html
https://bugzilla.suse.com/1159856
https://bugzilla.suse.com/1159858
https://bugzilla.suse.com/1159860
https://bugzilla.suse.com/1160249
https://bugzilla.suse.com/1160250
https://bugzilla.suse.com/1160251
https://bugzilla.suse.com/1160937
https://bugzilla.suse.com/1165680
https://bugzilla.suse.com/1169952