stable

python-paramiko-2.4.1-1.fc28

FEDORA-2018-8f9d81a3fb created by pghmcfc 6 years ago for Fedora 28

A flaw was found in the implementation of transport.py in Paramiko, which did not properly check whether authentication was completed before processing other requests. A customized SSH client could simply skip the authentication step.

This flaw is a user authentication bypass in the SSH Server functionality of Paramiko. Where Paramiko is used only for its client-side functionality (e.g. paramiko.SSHClient), the vulnerability is not exposed and thus cannot be exploited.

This update also fixes an issue where Ed25519 auth key decryption raised an unexpected exception when given a unicode password string (typical in Python 3).

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2018-8f9d81a3fb

This update has been submitted for testing by pghmcfc.

6 years ago

pghmcfc edited this update.

6 years ago

This update has been pushed to testing.

6 years ago
User Icon pwalter commented & provided feedback 6 years ago
karma

Works

This update has reached 3 days in testing and can be pushed to stable now if the maintainer wishes

6 years ago

This update has been submitted for batched by pghmcfc.

6 years ago

This update has been submitted for stable by bodhi.

6 years ago

This update has been pushed to stable.

6 years ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
1
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-1
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
6 years ago
in testing
6 years ago
in stable
6 years ago
modified
6 years ago
BZ#1557075 python-paramiko-2.4.1 is available
0
0
BZ#1557130 CVE-2018-7750 python-paramiko: Authentication bypass in transport.py
0
0
BZ#1557131 CVE-2018-7750 python-paramiko: Authentication bypass in transport.py [fedora-all]
0
0

Automated Test Results