CVE-2021-36370

NameCVE-2021-36370
DescriptionAn issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs993404

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mc (PTS)jessie3:4.8.13-3vulnerable
stretch3:4.8.18-1vulnerable
buster3:4.8.22-1vulnerable
bullseye3:4.8.26-1.1vulnerable
bookworm3:4.8.29-2fixed
sid, trixie3:4.8.31-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mcsource(unstable)3:4.8.27-1993404

Notes

[bullseye] - mc <no-dsa> (Minor issue)
[buster] - mc <no-dsa> (Minor issue)
[stretch] - mc <no-dsa> (Minor issue)
https://github.com/MidnightCommander/mc/commit/9235d3c232d13ad7f973346077c9cf2eaa77dc5f
[jessie] - mc <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems