Updated filezilla packages fix security vulnerability
Publication date: 27 Jul 2021Type: security
Affected Mageia releases : 8
CVE: CVE-2020-14002
Description
filezilla embeds a PuTTY client that was vulnerable: PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client) (CVE-2020-14002). The filezilla packages are updated to fix this issue to 3.55.0 version among other bugfixes since 3.51.0 we shipped in Mageia 8. See upstream release notes for more informations.
References
- https://bugs.mageia.org/show_bug.cgi?id=29186
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/26TACCSQYYCPWAJYNAUIXJGZ5RGORJZV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IRKUHQP6O6TGN64SI7PYCKHJT24Y2EY2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IRAC73KPNR4HKTRKJNLIZXCYIP6STUZN/
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://filezilla-project.org/versions.php
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14002
SRPMS
8/core
- libfilezilla-0.30.0-1.mga8
- filezilla-3.55.0-1.mga8