It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
https://www.openwall.com/lists/oss-security/2020/06/30/2
https://usn.ubuntu.com/4407-1/
https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433
https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
https://bugzilla.redhat.com/show_bug.cgi?id=1852356
http://www.openwall.com/lists/oss-security/2020/06/30/3
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html