{"id":"MGASA-2020-0207","summary":"Updated libvncserver packages fix security vulnerability","details":"Updated libvncserver packages fix security vulnerability:\n\nlibvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape\ninteger overflow and heap-based buffer overflow via a large height or width\nvalue (CVE-2019-20788).\n","modified":"2026-02-04T04:23:06.710397Z","published":"2020-05-08T10:57:54Z","related":["CVE-2019-20788"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0207.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26587"}],"affected":[{"package":{"name":"libvncserver","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libvncserver?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.12-2.3.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0207.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}