Debian-LTS has issued an advisory on January 4: https://www.debian.org/lts/security/2021/dla-2516 The issue is fixed upstream in 0.8.3.
Status comment: (none) => Fixed upstream in 0.8.3
This is just for M7, we have 0.8.3 in Cauldron. Assigning to the current maintainer.
Assignee: bugsquad => guillomovitch
I just submitted gssproxy-0.8.2-2.1.mga7 in update_testing for mageia 7.
Advisory: ======================== Updated gssproxy package fixes security vulnerability: gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c (CVE-2020-12658). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12658 https://www.debian.org/lts/security/2021/dla-2516 ======================== Updated packages in core/updates_testing: ======================== gssproxy-0.8.2-2.1.mga7 from gssproxy-0.8.2-2.1.mga7.src.rpm
CC: (none) => guillomovitchStatus comment: Fixed upstream in 0.8.3 => (none)Assignee: guillomovitch => qa-bugs