MGASA-2021-0380

Source
https://advisories.mageia.org/MGASA-2021-0380.html
Import Source
https://advisories.mageia.org/MGASA-2021-0380.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0380
Related
Published
2021-07-27T20:21:53Z
Modified
2021-07-27T19:57:34Z
Summary
Updated filezilla packages fix security vulnerability
Details

filezilla embeds a PuTTY client that was vulnerable: PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client) (CVE-2020-14002).

The filezilla packages are updated to fix this issue to 3.55.0 version among other bugfixes since 3.51.0 we shipped in Mageia 8. See upstream release notes for more informations.

References
Credits

Affected packages

Mageia:8 / libfilezilla

Package

Name
libfilezilla
Purl
pkg:rpm/mageia/libfilezilla?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.30.0-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / filezilla

Package

Name
filezilla
Purl
pkg:rpm/mageia/filezilla?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.55.0-1.mga8

Ecosystem specific

{
    "section": "core"
}