MGASA-2013-0300

Source
https://advisories.mageia.org/MGASA-2013-0300.html
Import Source
https://advisories.mageia.org/MGASA-2013-0300.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2013-0300
Related
Published
2013-10-09T22:37:26Z
Modified
2013-10-09T22:37:19Z
Summary
Updated vino packages fix CVE-2013-5745
Details

Updated vino package fixes security vulnerability:

The vinoserverclientdatapending function in vino-server.c in GNOME Vino 3.7.3 and earlier, when encryption is disabled, does not properly clear client data when an error causes the connection to close during authentication, which allows remote attackers to cause a denial of service (infinite loop, CPU and disk consumption) via multiple crafted requests during authentication (CVE-2013-5745).

References
Credits

Affected packages

Mageia:2 / vino

Package

Name
vino
Purl
pkg:rpm/mageia/vino?arch=source&distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.2-1.2.mga2

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / vino

Package

Name
vino
Purl
pkg:rpm/mageia/vino?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.3-2.1.mga3

Ecosystem specific

{
    "section": "core"
}