It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html
www.openwall.com/lists/oss-security/2020/06/30/3
bugzilla.redhat.com/show_bug.cgi?id=1852356
cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/
usn.ubuntu.com/4407-1/
www.openwall.com/lists/oss-security/2020/06/30/2