New Debian glib2.0 2.74.6-2+deb12u5 fixes: This update addresses the following issue: * glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
--- mirror/ftp/pool/main/g/glib2.0/glib2.0_2.74.6-2+deb12u4.dsc +++ apt/ucs_5.2-0-errata5.2-0/source/glib2.0_2.74.6-2+deb12u5.dsc @@ -1,3 +1,9 @@ +2.74.6-2+deb12u5 [Thu, 14 Nov 2024 09:42:34 +0000] Simon McVittie <smcv@debian.org>: + + * d/p/gsocks4aproxy-Fix-a-single-byte-buffer-overflow-in-connec.patch: + Fix a buffer overflow when configured to use a SOCKS4a proxy with a + very long username (CVE-2024-52533, Closes: #1087419) + 2.74.6-2+deb12u4 [Mon, 28 Oct 2024 08:41:03 +0000] Simon McVittie <smcv@debian.org>: [ Helmut Grohne ] <http://piuparts.knut.univention.de/5.2-0/#6228519343984977608>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.2-0] 4d4b3b9767 Bug #57920: glib2.0 2.74.6-2+deb12u5 doc/errata/staging/glib2.0.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.2x5>