File _patchinfo of Package patchinfo.13718
<patchinfo incident="13718">
<issue tracker="cve" id="2019-15695"/>
<issue tracker="cve" id="2019-15694"/>
<issue tracker="cve" id="2019-15693"/>
<issue tracker="cve" id="2019-15691"/>
<issue tracker="cve" id="2019-15692"/>
<issue tracker="bnc" id="1160250">VUL-0: CVE-2019-15692: tigervnc: improper value checks in CopyRectDecode may lead to heap buffer overflow</issue>
<issue tracker="bnc" id="1159856">VUL-0: CVE-2019-15691: tigervnc: stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder</issue>
<issue tracker="bnc" id="1159858">VUL-0: CVE-2019-15693: tigervnc: heap buffer overflow in TightDecoder::FilterGradient</issue>
<issue tracker="bnc" id="1159860">VUL-0: CVE-2019-15695: tigervnc: stack buffer overflow, which could be triggered from CMsgReader::readSetCurso</issue>
<issue tracker="bnc" id="1160251">VUL-0: CVE-2019-15694: tigervnc: improper error handling in processing MemOutStream may lead to heap buffer overflow</issue>
<packager>sndirsch</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for tigervnc</summary>
<description>This update for tigervnc fixes the following issues:
- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
</description>
</patchinfo>