Updated python-paramiko packages fix security vulnerability
Publication date: 15 Apr 2018Modification date: 15 Apr 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-7750
Description
A flaw was found in the implementation of `transport.py` in Paramiko, which did not properly check whether authentication was completed before processing other requests. A customized SSH client could simply skip the authentication step (CVE-2018-7750). This flaw is a user authentication bypass in the SSH Server functionality of Paramiko. Where Paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.
References
SRPMS
6/core
- python-paramiko-2.0.8-1.mga6