Mageia 2020-0314: glib-networking security update
Summary
The updated packages fix a security vulnerability:
In GNOME glib-networking through 2.64.2, the implementation of
GTlsClientConnection skips hostname verification of the server's
TLS certificate if the application fails to specify the expected
server identity. This is in contrast to its intended documented
behavior, to fail the certificate verification. Applications that
fail to provide the server identity, including Balsa before 2.5.11
and 2.6.x before 2.6.1, accept a TLS certificate if the certificate
is valid for any host. (CVE-2020-13645)
References
- https://bugs.mageia.org/show_bug.cgi?id=26819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13645
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TQEQJQ4XFMFCFJTEXKL2ZO3UELBPCKSK/
- https://ubuntu.com/security/notices/USN-4405-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13645
Resolution
MGASA-2020-0314 - Updated glib-networking packages fix security vulnerability
SRPMS
- 7/core/glib-networking-2.60.2-1.1.mga7