ALT-PU-2020-1480-1
Closed vulnerabilities
Published: 2020-01-09
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-6750
GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.
Severity: MEDIUM (5.9)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1160668
- https://bugzilla.suse.com/show_bug.cgi?id=1160668
- https://gitlab.gnome.org/GNOME/glib/issues/1989
- https://gitlab.gnome.org/GNOME/glib/issues/1989
- FEDORA-2020-339d413324
- FEDORA-2020-339d413324
- FEDORA-2020-092ef6572a
- FEDORA-2020-092ef6572a
- FEDORA-2020-c101a316ab
- FEDORA-2020-c101a316ab
- https://security.netapp.com/advisory/ntap-20200127-0001/
- https://security.netapp.com/advisory/ntap-20200127-0001/
Published: 2022-08-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
References:
- https://access.redhat.com/security/cve/CVE-2021-3800
- https://access.redhat.com/security/cve/CVE-2021-3800
- https://bugzilla.redhat.com/show_bug.cgi?id=1938284
- https://bugzilla.redhat.com/show_bug.cgi?id=1938284
- https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
- https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
- [debian-lts-announce] 20220915 [SECURITY] [DLA 3110-1] glib2.0 security update
- [debian-lts-announce] 20220915 [SECURITY] [DLA 3110-1] glib2.0 security update
- https://security.netapp.com/advisory/ntap-20221028-0004/
- https://security.netapp.com/advisory/ntap-20221028-0004/
- https://www.openwall.com/lists/oss-security/2017/06/23/8
- https://www.openwall.com/lists/oss-security/2017/06/23/8