Your submission was sent successfully! Close

CVE-2019-15690

Published: 31 December 2019

heap buffer overflow in libvncclient/cursor.c related to large cursor sizes when connected to a malicious server

Priority

Medium

Status

Package Release Status
libvncserver
Launchpad, Ubuntu, Debian
bionic
Released (0.9.11+dfsg-1ubuntu1.2)
eoan
Released (0.9.11+dfsg-1.3ubuntu0.1)
focal
Released (0.9.12+dfsg-9ubuntu0.1)
groovy Not vulnerable
(0.9.13+dfsg-1)
hirsute Not vulnerable
(0.9.13+dfsg-1)
impish Not vulnerable
(0.9.13+dfsg-1)
jammy Not vulnerable
(0.9.13+dfsg-1)
precise Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (0.9.10+dfsg-3ubuntu0.16.04.4)
Patches:
upstream: https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
x11vnc
Launchpad, Ubuntu, Debian
bionic Needed

eoan Ignored
(reached end-of-life)
focal Needed

groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish Ignored
(reached end-of-life)
jammy Needed

precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)