MGASA-2018-0204

Source
https://advisories.mageia.org/MGASA-2018-0204.html
Import Source
https://advisories.mageia.org/MGASA-2018-0204.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0204
Related
Published
2018-04-15T13:33:47Z
Modified
2018-04-15T13:17:34Z
Summary
Updated python-paramiko packages fix security vulnerability
Details

A flaw was found in the implementation of transport.py in Paramiko, which did not properly check whether authentication was completed before processing other requests. A customized SSH client could simply skip the authentication step (CVE-2018-7750).

This flaw is a user authentication bypass in the SSH Server functionality of Paramiko. Where Paramiko is used only for its client-side functionality (e.g. paramiko.SSHClient), the vulnerability is not exposed and thus cannot be exploited.

References
Credits

Affected packages

Mageia:6 / python-paramiko

Package

Name
python-paramiko
Purl
pkg:rpm/mageia/python-paramiko?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.8-1.mga6

Ecosystem specific

{
    "section": "core"
}