Updated libvncserver packages fix security vulnerabilities:
libvncclient/sockets.c in LibVNCServer had a buffer overflow via a long socket filename (CVE-2019-20839).
libvncserver/rfbregion.c had a NULL pointer dereference (CVE-2020-14397).
Byte-aligned data was accessed through uint32_t pointers in libvncclient/rfbproto.c (CVE-2020-14399).
Byte-aligned data was accessed through uint16_t pointers in libvncserver/translate.c (CVE-2020-14400).
libvncserver/scale.c had a pixel_value integer overflow (CVE-2020-14401).
libvncserver/corre.c allowed out-of-bounds access via encodings (CVE-2020-14402).
libvncserver/hextile.c allowed out-of-bounds access via encodings (CVE-2020-14403).
libvncserver/rre.c allowed out-of-bounds access via encodings (CVE-2020-14404).
libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405).
The libvncserver package has been updated to version 0.9.13, fixing these issues and several others. See the release announcement for details.