TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. Upstream patch: https://github.com/CendioOssman/tigervnc/commit/0943c006c7d900dfc0281639e992791d6c567438 References: https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1 https://www.openwall.com/lists/oss-security/2019/12/20/2
Created tigervnc tracking bugs for this issue: Affects: fedora-all [bug 1790316]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1497 https://access.redhat.com/errata/RHSA-2020:1497
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15694
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3875 https://access.redhat.com/errata/RHSA-2020:3875