Mageia 2021-0118: openssh security update
Summary
The client side in OpenSSH 5.7 through 8.3 has an Observable Discrepancy
leading to an information leak in the algorithm negotiation. This allows
man-in-the-middle attackers to target initial connection attempts (where no
host key for the server has been cached by the client) (CVE-2020-14145).
References
- https://bugs.mageia.org/show_bug.cgi?id=27706
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
Resolution
MGASA-2021-0118 - Updated openssh packages fix a security vulnerability
SRPMS
- 7/core/openssh-8.0p1-1.1.mga7