Updated glib2.0 packages fix security vulnerability
Publication date: 06 Mar 2020Modification date: 06 Mar 2020
Type: security
Affected Mageia releases : 7
CVE: CVE-2020-6750
Description
The updated packages fix a security vulnerability: GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. (CVE-2020-6750)
References
- https://bugs.mageia.org/show_bug.cgi?id=26230
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5RIFEDSRJ4P3WFCMDUOFQ2LEILZLMDW7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/KJMLGW55HOQXHMTIPH2PWXFRBNBWVO4W/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750
SRPMS
7/core
- glib2.0-2.60.2-1.3.mga7