Lucene search

K
suseSuseOPENSUSE-SU-2020:0087-1
HistoryJan 21, 2020 - 12:00 a.m.

Security update for tigervnc (important)

2020-01-2100:00:00
lists.opensuse.org
53

0.006 Low

EPSS

Percentile

79.3%

An update that fixes 5 vulnerabilities is now available.

Description:

This update for tigervnc fixes the following issues:

  • CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack
    memory in ZRLEDecoder (bsc#1159856).
  • CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode
    (bsc#1160250).
  • CVE-2019-15693: Fixed a heap-based buffer overflow in
    TightDecoder::FilterGradient (bsc#1159858).
  • CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper
    error handling in processing MemOutStream (bsc#1160251).
  • CVE-2019-15695: Fixed a stack-based buffer overflow, which could be
    triggered from CMsgReader::readSetCursor (bsc#1159860).

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-87=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1noarch< - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm