File _patchinfo of Package patchinfo.5211

<patchinfo incident="5211">
  <issue tracker="cve" id="2019-15695"/>
  <issue tracker="cve" id="2019-15694"/>
  <issue tracker="cve" id="2019-15692"/>
  <issue tracker="cve" id="2019-15693"/>
  <issue tracker="cve" id="2019-15691"/>
  <issue tracker="bnc" id="1159858">VUL-0: CVE-2019-15693: tigervnc: heap buffer overflow  in TightDecoder::FilterGradient</issue>
  <issue tracker="bnc" id="1159860">VUL-0: CVE-2019-15695: tigervnc: stack buffer overflow, which could be triggered from CMsgReader::readSetCurso</issue>
  <issue tracker="bnc" id="1160250">VUL-0: CVE-2019-15692: tigervnc: improper value checks in CopyRectDecode may lead to heap buffer overflow</issue>
  <issue tracker="bnc" id="1160251">VUL-0: CVE-2019-15694: tigervnc: improper error handling in processing MemOutStream may lead to heap buffer overflow</issue>
  <issue tracker="bnc" id="1159856">VUL-0: CVE-2019-15691: tigervnc: stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder</issue>
  <issue id="1041847" tracker="bnc">Unable to access vnc through browser with default encrypted connection</issue>
  <issue id="1053373" tracker="bnc">MIT-SHM extension does not work in Xvnc</issue>
  <issue tracker="bnc" id="1160937">tigervnc update login issues on xvnc</issue>
  <packager>sndirsch</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for tigervnc</summary>
  <description>This update for tigervnc provides the following fixes:

Security issues fixed:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).

Non-security issue fixed:

- Make sure CN in generated certificate doesn't exceed 64 characters. (bnc#1041847)
- Change with-vnc-key.sh to generate TLS certificate using current hostname to keep it short. (bsc#1041847)
- Disable MIT-SHM extension when running under user "vnc". (bsc#1053373)
</description>
</patchinfo>
openSUSE Build Service is sponsored by