TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. Upstream patch: https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95 References: https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1 https://www.openwall.com/lists/oss-security/2019/12/20/2
Created tigervnc tracking bugs for this issue: Affects: fedora-all [bug 1790314]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1497 https://access.redhat.com/errata/RHSA-2020:1497
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15693
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3875 https://access.redhat.com/errata/RHSA-2020:3875