<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">LibVNCServer-devel-0.9.13-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10598</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">LibVNCServer-devel-0.9.13-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the LibVNCServer-devel-0.9.13-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10598</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10598</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2450/</URL>
      <Description>SUSE CVE CVE-2006-2450 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18922/</URL>
      <Description>SUSE CVE CVE-2017-18922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15126/</URL>
      <Description>SUSE CVE CVE-2018-15126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15127/</URL>
      <Description>SUSE CVE CVE-2018-15127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20019/</URL>
      <Description>SUSE CVE CVE-2018-20019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20020/</URL>
      <Description>SUSE CVE CVE-2018-20020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20021/</URL>
      <Description>SUSE CVE CVE-2018-20021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20022/</URL>
      <Description>SUSE CVE CVE-2018-20022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20023/</URL>
      <Description>SUSE CVE CVE-2018-20023 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20024/</URL>
      <Description>SUSE CVE CVE-2018-20024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20748/</URL>
      <Description>SUSE CVE CVE-2018-20748 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20749/</URL>
      <Description>SUSE CVE CVE-2018-20749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20750/</URL>
      <Description>SUSE CVE CVE-2018-20750 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-21247/</URL>
      <Description>SUSE CVE CVE-2018-21247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6307/</URL>
      <Description>SUSE CVE CVE-2018-6307 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7225/</URL>
      <Description>SUSE CVE CVE-2018-7225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15681/</URL>
      <Description>SUSE CVE CVE-2019-15681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15690/</URL>
      <Description>SUSE CVE CVE-2019-15690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20788/</URL>
      <Description>SUSE CVE CVE-2019-20788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20839/</URL>
      <Description>SUSE CVE CVE-2019-20839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20840/</URL>
      <Description>SUSE CVE CVE-2019-20840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14397/</URL>
      <Description>SUSE CVE CVE-2020-14397 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14398/</URL>
      <Description>SUSE CVE CVE-2020-14398 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14399/</URL>
      <Description>SUSE CVE CVE-2020-14399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14400/</URL>
      <Description>SUSE CVE CVE-2020-14400 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14401/</URL>
      <Description>SUSE CVE CVE-2020-14401 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14402/</URL>
      <Description>SUSE CVE CVE-2020-14402 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14403/</URL>
      <Description>SUSE CVE CVE-2020-14403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14404/</URL>
      <Description>SUSE CVE CVE-2020-14404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25708/</URL>
      <Description>SUSE CVE CVE-2020-25708 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="LibVNCServer-devel-0.9.13-3.1">
      <FullProductName ProductID="LibVNCServer-devel-0.9.13-3.1">LibVNCServer-devel-0.9.13-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvncclient1-0.9.13-3.1">
      <FullProductName ProductID="libvncclient1-0.9.13-3.1">libvncclient1-0.9.13-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvncserver1-0.9.13-3.1">
      <FullProductName ProductID="libvncserver1-0.9.13-3.1">libvncserver1-0.9.13-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="LibVNCServer-devel-0.9.13-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1">LibVNCServer-devel-0.9.13-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvncclient1-0.9.13-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvncclient1-0.9.13-3.1">libvncclient1-0.9.13-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvncserver1-0.9.13-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvncserver1-0.9.13-3.1">libvncserver1-0.9.13-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.</Note>
    </Notes>
    <CVE>CVE-2006-2450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2450.html</URL>
        <Description>CVE-2006-2450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/184418</URL>
        <Description>SUSE Bug 184418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2017-18922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18922.html</URL>
        <Description>CVE-2017-18922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-15126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15126.html</URL>
        <Description>CVE-2018-15126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120114</URL>
        <Description>SUSE Bug 1120114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-15127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15127.html</URL>
        <Description>CVE-2018-15127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120117</URL>
        <Description>SUSE Bug 1120117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123828</URL>
        <Description>SUSE Bug 1123828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123832</URL>
        <Description>SUSE Bug 1123832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-20019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20019.html</URL>
        <Description>CVE-2018-20019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120118</URL>
        <Description>SUSE Bug 1120118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123823</URL>
        <Description>SUSE Bug 1123823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155442</URL>
        <Description>SUSE Bug 1155442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution</Note>
    </Notes>
    <CVE>CVE-2018-20020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20020.html</URL>
        <Description>CVE-2018-20020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120116</URL>
        <Description>SUSE Bug 1120116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155472</URL>
        <Description>SUSE Bug 1155472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM</Note>
    </Notes>
    <CVE>CVE-2018-20021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20021.html</URL>
        <Description>CVE-2018-20021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120122</URL>
        <Description>SUSE Bug 1120122</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR</Note>
    </Notes>
    <CVE>CVE-2018-20022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20022.html</URL>
        <Description>CVE-2018-20022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120120</URL>
        <Description>SUSE Bug 1120120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR</Note>
    </Notes>
    <CVE>CVE-2018-20023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20023.html</URL>
        <Description>CVE-2018-20023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120119</URL>
        <Description>SUSE Bug 1120119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.</Note>
    </Notes>
    <CVE>CVE-2018-20024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20024.html</URL>
        <Description>CVE-2018-20024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120121</URL>
        <Description>SUSE Bug 1120121</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.</Note>
    </Notes>
    <CVE>CVE-2018-20748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20748.html</URL>
        <Description>CVE-2018-20748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120118</URL>
        <Description>SUSE Bug 1120118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123823</URL>
        <Description>SUSE Bug 1123823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155442</URL>
        <Description>SUSE Bug 1155442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.</Note>
    </Notes>
    <CVE>CVE-2018-20749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20749.html</URL>
        <Description>CVE-2018-20749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120117</URL>
        <Description>SUSE Bug 1120117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123828</URL>
        <Description>SUSE Bug 1123828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123832</URL>
        <Description>SUSE Bug 1123832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.</Note>
    </Notes>
    <CVE>CVE-2018-20750</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20750.html</URL>
        <Description>CVE-2018-20750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120117</URL>
        <Description>SUSE Bug 1120117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123832</URL>
        <Description>SUSE Bug 1123832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.</Note>
    </Notes>
    <CVE>CVE-2018-21247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-21247.html</URL>
        <Description>CVE-2018-21247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173874</URL>
        <Description>SUSE Bug 1173874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-6307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6307.html</URL>
        <Description>CVE-2018-6307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120115</URL>
        <Description>SUSE Bug 1120115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.</Note>
    </Notes>
    <CVE>CVE-2018-7225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7225.html</URL>
        <Description>CVE-2018-7225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081493</URL>
        <Description>SUSE Bug 1081493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090647</URL>
        <Description>SUSE Bug 1090647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.</Note>
    </Notes>
    <CVE>CVE-2019-15681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15681.html</URL>
        <Description>CVE-2019-15681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155419</URL>
        <Description>SUSE Bug 1155419</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2019-15690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15690.html</URL>
        <Description>CVE-2019-15690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160471</URL>
        <Description>SUSE Bug 1160471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170441</URL>
        <Description>SUSE Bug 1170441</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.</Note>
    </Notes>
    <CVE>CVE-2019-20788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20788.html</URL>
        <Description>CVE-2019-20788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1170441</URL>
        <Description>SUSE Bug 1170441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173698</URL>
        <Description>SUSE Bug 1173698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.</Note>
    </Notes>
    <CVE>CVE-2019-20839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20839.html</URL>
        <Description>CVE-2019-20839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173875</URL>
        <Description>SUSE Bug 1173875</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.</Note>
    </Notes>
    <CVE>CVE-2019-20840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20840.html</URL>
        <Description>CVE-2019-20840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173876</URL>
        <Description>SUSE Bug 1173876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2020-14397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14397.html</URL>
        <Description>CVE-2020-14397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173700</URL>
        <Description>SUSE Bug 1173700</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.</Note>
    </Notes>
    <CVE>CVE-2020-14398</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14398.html</URL>
        <Description>CVE-2020-14398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173880</URL>
        <Description>SUSE Bug 1173880</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."</Note>
    </Notes>
    <CVE>CVE-2020-14399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14399.html</URL>
        <Description>CVE-2020-14399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173743</URL>
        <Description>SUSE Bug 1173743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.</Note>
    </Notes>
    <CVE>CVE-2020-14400</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14400.html</URL>
        <Description>CVE-2020-14400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173691</URL>
        <Description>SUSE Bug 1173691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.</Note>
    </Notes>
    <CVE>CVE-2020-14401</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14401.html</URL>
        <Description>CVE-2020-14401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173694</URL>
        <Description>SUSE Bug 1173694</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.</Note>
    </Notes>
    <CVE>CVE-2020-14402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14402.html</URL>
        <Description>CVE-2020-14402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173477</URL>
        <Description>SUSE Bug 1173477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173701</URL>
        <Description>SUSE Bug 1173701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.</Note>
    </Notes>
    <CVE>CVE-2020-14403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14403.html</URL>
        <Description>CVE-2020-14403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173701</URL>
        <Description>SUSE Bug 1173701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.</Note>
    </Notes>
    <CVE>CVE-2020-14404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14404.html</URL>
        <Description>CVE-2020-14404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173701</URL>
        <Description>SUSE Bug 1173701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-25708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:LibVNCServer-devel-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncclient1-0.9.13-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvncserver1-0.9.13-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25708.html</URL>
        <Description>CVE-2020-25708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178682</URL>
        <Description>SUSE Bug 1178682</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
