File _patchinfo of Package patchinfo.13718

<patchinfo incident="13718">
  <issue tracker="cve" id="2019-15695"/>
  <issue tracker="cve" id="2019-15694"/>
  <issue tracker="cve" id="2019-15693"/>
  <issue tracker="cve" id="2019-15691"/>
  <issue tracker="cve" id="2019-15692"/>
  <issue tracker="bnc" id="1160250">VUL-0: CVE-2019-15692: tigervnc: improper value checks in CopyRectDecode may lead to heap buffer overflow</issue>
  <issue tracker="bnc" id="1159856">VUL-0: CVE-2019-15691: tigervnc: stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder</issue>
  <issue tracker="bnc" id="1159858">VUL-0: CVE-2019-15693: tigervnc: heap buffer overflow  in TightDecoder::FilterGradient</issue>
  <issue tracker="bnc" id="1159860">VUL-0: CVE-2019-15695: tigervnc: stack buffer overflow, which could be triggered from CMsgReader::readSetCurso</issue>
  <issue tracker="bnc" id="1160251">VUL-0: CVE-2019-15694: tigervnc: improper error handling in processing MemOutStream may lead to heap buffer overflow</issue>
  <packager>sndirsch</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for tigervnc</summary>
  <description>This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
</description>
</patchinfo>
openSUSE Build Service is sponsored by