Mageia 2020-0118: glib2.0 security update
Summary
The updated packages fix a security vulnerability:
GSocketClient in GNOME GLib through 2.62.4 may occasionally connect
directly to a target address instead of connecting via a proxy server
when configured to do so, because the proxy_addr field is mishandled.
This bug is timing-dependent and may occur only sporadically depending
on network delays. The greatest security relevance is in use cases
where a proxy is used to help with privacy/anonymity, even though there
is no technical barrier to a direct connection. (CVE-2020-6750)
References
- https://bugs.mageia.org/show_bug.cgi?id=26230
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5RIFEDSRJ4P3WFCMDUOFQ2LEILZLMDW7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/KJMLGW55HOQXHMTIPH2PWXFRBNBWVO4W/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750
Resolution
MGASA-2020-0118 - Updated glib2.0 packages fix security vulnerability
SRPMS
- 7/core/glib2.0-2.60.2-1.3.mga7