First published: Thu Jan 09 2020(Updated: )
GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME GLib | >=2.60.0<=2.62.4 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6750 is a vulnerability in GNOME GLib that may occasionally connect directly to a target address instead of connecting via a proxy server.
CVE-2020-6750 has a severity score of 5.9, which is considered medium.
GNOME GLib versions 2.60.0 to 2.62.4, Fedora 30, and Fedora 31 are affected by CVE-2020-6750.
To fix CVE-2020-6750, update to a version of GNOME GLib or Fedora that includes the patch for this vulnerability.
You can find more information about CVE-2020-6750 in the references provided: [https://bugzilla.suse.com/show_bug.cgi?id=1160668](https://bugzilla.suse.com/show_bug.cgi?id=1160668), [https://gitlab.gnome.org/GNOME/glib/issues/1989](https://gitlab.gnome.org/GNOME/glib/issues/1989), [https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RIFEDSRJ4P3WFCMDUOFQ2LEILZLMDW7/](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RIFEDSRJ4P3WFCMDUOFQ2LEILZLMDW7/)