Information Exposure Affecting glib package, versions <2.62.5-r0


0.0
medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High

    Threat Intelligence

    EPSS 0.22% (60th percentile)
Expand this section
NVD
5.9 medium
Expand this section
Red Hat
6.8 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ALPINE311-GLIB-589005
  • published 21 Jul 2020
  • disclosed 9 Jan 2020

How to fix?

Upgrade Alpine:3.11 glib to version 2.62.5-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream glib package and not the glib package as distributed by Alpine. See How to fix? for Alpine:3.11 relevant fixed versions and status.

GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.