Lucene search

K
mageiaGentoo FoundationMGASA-2018-0204
HistoryApr 15, 2018 - 4:33 p.m.

Updated python-paramiko packages fix security vulnerability

2018-04-1516:33:47
Gentoo Foundation
advisories.mageia.org
22

0.066 Low

EPSS

Percentile

93.8%

A flaw was found in the implementation of transport.py in Paramiko, which did not properly check whether authentication was completed before processing other requests. A customized SSH client could simply skip the authentication step (CVE-2018-7750). This flaw is a user authentication bypass in the SSH Server functionality of Paramiko. Where Paramiko is used only for its client-side functionality (e.g. paramiko.SSHClient), the vulnerability is not exposed and thus cannot be exploited.

OSVersionArchitecturePackageVersionFilename
Mageia6noarchpython-paramiko< 2.0.8-1python-paramiko-2.0.8-1.mga6