CVE-2021-36370

NameCVE-2021-36370
DescriptionAn issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
Debian Bugs993404

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mc (PTS)stretch3:4.8.18-1vulnerable
buster3:4.8.22-1vulnerable
bullseye3:4.8.26-1.1vulnerable
bookworm, sid3:4.8.28-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mcsource(unstable)3:4.8.27-1993404

Notes

[bullseye] - mc <no-dsa> (Minor issue)
[buster] - mc <no-dsa> (Minor issue)
[stretch] - mc <no-dsa> (Minor issue)
https://github.com/MidnightCommander/mc/commit/9235d3c232d13ad7f973346077c9cf2eaa77dc5f

Search for package or bug name: Reporting problems