{"affected":[{"ecosystem_specific":{"binaries":[{"LibVNCServer-devel":"0.9.10-lp152.9.8.1","libvncclient0":"0.9.10-lp152.9.8.1","libvncserver0":"0.9.10-lp152.9.8.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"LibVNCServer","purl":"pkg:rpm/opensuse/LibVNCServer&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.10-lp152.9.8.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for LibVNCServer fixes the following issues:\n\n- security update\n- added patches\n  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak\n  + LibVNCServer-CVE-2018-21247.patch\n  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()\n  + LibVNCServer-CVE-2019-20839.patch\n  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service\n  + LibVNCServer-CVE-2019-20840.patch\n  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c\n  + LibVNCServer-CVE-2020-14398.patch\n  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c\n  + LibVNCServer-CVE-2020-14397.patch\n  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.\n  + LibVNCServer-CVE-2020-14399.patch\n  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.\n  + LibVNCServer-CVE-2020-14400.patch\n  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c\n  + LibVNCServer-CVE-2020-14401.patch\n  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.\n  + LibVNCServer-CVE-2020-14402,14403,14404.patch\n  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2020:1025-1","modified":"2020-07-21T08:27:26Z","published":"2020-07-21T08:27:26Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MRXTN4MBX2MAHYVC2KCQATTKYECU2TZT/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173477"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173691"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173694"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173874"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-18922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-21247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-20839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-20840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14402"}],"related":["CVE-2017-18922","CVE-2018-21247","CVE-2019-20839","CVE-2019-20840","CVE-2020-14397","CVE-2020-14398","CVE-2020-14399","CVE-2020-14400","CVE-2020-14401","CVE-2020-14402"],"summary":"Security update for LibVNCServer","upstream":["CVE-2017-18922","CVE-2018-21247","CVE-2019-20839","CVE-2019-20840","CVE-2020-14397","CVE-2020-14398","CVE-2020-14399","CVE-2020-14400","CVE-2020-14401","CVE-2020-14402"]}