Your message dated Mon, 30 Dec 2019 15:05:29 +0000
with message-id <e1ilwbp-0009ey...@fasolo.debian.org>
and subject line Bug#947428: fixed in tigervnc 1.10.1+dfsg-1
has caused the Debian Bug report #947428,
regarding tigervnc: CVE-2019-15691 CVE-2019-15692 CVE-2019-15693 CVE-2019-15694
CVE-2019-15695
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
947428: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: tigervnc
Version: 1.9.0+dfsg-4
Severity: grave
Tags: security upstream
Control: found -1 1.9.0+dfsg-3
Hi,
The following vulnerabilities were published for tigervnc.
CVE-2019-15691[0]:
| TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-
| return, which occurs due to incorrect usage of stack memory in
| ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder
| may try to access stack variable, which has been already freed during
| the process of stack unwinding. Exploitation of this vulnerability
| could potentially result into remote code execution. This attack
| appear to be exploitable via network connectivity.
CVE-2019-15692[1]:
| TigerVNC version prior to 1.10.1 is vulnerable to heap buffer
| overflow. Vulnerability could be triggered from CopyRectDecoder due to
| incorrect value checks. Exploitation of this vulnerability could
| potentially result into remote code execution. This attack appear to
| be exploitable via network connectivity.
CVE-2019-15693[2]:
| TigerVNC version prior to 1.10.1 is vulnerable to heap buffer
| overflow, which occurs in TightDecoder::FilterGradient. Exploitation
| of this vulnerability could potentially result into remote code
| execution. This attack appear to be exploitable via network
| connectivity.
CVE-2019-15694[3]:
| TigerVNC version prior to 1.10.1 is vulnerable to heap buffer
| overflow, which could be triggered from DecodeManager::decodeRect.
| Vulnerability occurs due to the signdness error in processing
| MemOutStream. Exploitation of this vulnerability could potentially
| result into remote code execution. This attack appear to be
| exploitable via network connectivity.
CVE-2019-15695[4]:
| TigerVNC version prior to 1.10.1 is vulnerable to stack buffer
| overflow, which could be triggered from CMsgReader::readSetCursor.
| This vulnerability occurs due to insufficient sanitization of
| PixelFormat. Since remote attacker can choose offset from start of the
| buffer to start writing his values, exploitation of this vulnerability
| could potentially result into remote code execution. This attack
| appear to be exploitable via network connectivity.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-15691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691
[1] https://security-tracker.debian.org/tracker/CVE-2019-15692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692
[2] https://security-tracker.debian.org/tracker/CVE-2019-15693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693
[3] https://security-tracker.debian.org/tracker/CVE-2019-15694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694
[4] https://security-tracker.debian.org/tracker/CVE-2019-15695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695
Please adjust the affected versions in the BTS as needed.
-- System Information:
Debian Release: bullseye/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 5.3.0-3-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Source: tigervnc
Source-Version: 1.10.1+dfsg-1
We believe that the bug you reported is fixed in the latest version of
tigervnc, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 947...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Mike Gabriel <sunwea...@debian.org> (supplier of updated tigervnc package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 30 Dec 2019 15:38:21 +0100
Source: tigervnc
Architecture: source
Version: 1.10.1+dfsg-1
Distribution: unstable
Urgency: high
Maintainer: TigerVNC Packaging Team <pkg-tigervnc-de...@lists.alioth.debian.org>
Changed-By: Mike Gabriel <sunwea...@debian.org>
Closes: 947428
Changes:
tigervnc (1.10.1+dfsg-1) unstable; urgency=high
.
[ Joachim Falk ]
* Fresh upstream TigerVNC 1.10.1 fixes CVE-2019-15691, CVE-2019-15692,
CVE-2019-15693, CVE-2019-15694, and CVE-2019-15695 (Closes: #947428)
* Fixed bug in PlatformPixelBuffer::setupShm to use correct width and height
methods.
Checksums-Sha1:
442d11883c44a1b9823bff0d3c164a97ff398767 4007 tigervnc_1.10.1+dfsg-1.dsc
2ffd325f90ed3eaa2da2a91303c69f178c68fbff 942520
tigervnc_1.10.1+dfsg.orig.tar.xz
add2a8784cef21c34ff888266f776c1a5f8cd5ae 58560
tigervnc_1.10.1+dfsg-1.debian.tar.xz
bed627050e0ac5667229f2b7fc182e9ac6bc041a 13804
tigervnc_1.10.1+dfsg-1_source.buildinfo
Checksums-Sha256:
3688c9cf88f12695e2ce794c609c7636aa1b13fb24fe599df11b1ae730e84847 4007
tigervnc_1.10.1+dfsg-1.dsc
3ddb612c7d8f9710593c016523c53a14f0909b3131d2fe89a953f3a845c07c7c 942520
tigervnc_1.10.1+dfsg.orig.tar.xz
83d50a4d9571b21ec0613bd2c3f45b2709397fd6f88c50ff6849ef85b33af204 58560
tigervnc_1.10.1+dfsg-1.debian.tar.xz
eda66e170c2e6fb220e63969b21293c49f8cbce2cf8826a3e4a5caebcabf3e36 13804
tigervnc_1.10.1+dfsg-1_source.buildinfo
Files:
12408fb1cbb3cafd8fed49c49ed1b63e 4007 x11 optional tigervnc_1.10.1+dfsg-1.dsc
dbe952a5b824692b7adb92e46e725165 942520 x11 optional
tigervnc_1.10.1+dfsg.orig.tar.xz
c64a59c3c580ae12fa096054ee74a5f8 58560 x11 optional
tigervnc_1.10.1+dfsg-1.debian.tar.xz
96f4d237bcdd8700c52a36c992e9bd3d 13804 x11 optional
tigervnc_1.10.1+dfsg-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=VoWR
-----END PGP SIGNATURE-----
--- End Message ---