Mageia 2020-0358: putty security update
Summary
PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information
leak in the algorithm negotiation. This allows man-in-the-middle attackers to
target initial connection attempts (where no host key for the server has been
cached by the client) (CVE-2020-14002).
References
- https://bugs.mageia.org/show_bug.cgi?id=26875
- https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/26TACCSQYYCPWAJYNAUIXJGZ5RGORJZV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14002
Resolution
MGASA-2020-0358 - Updated putty package fixes security vulnerability
SRPMS
- 7/core/putty-0.74-1.mga7