==========================================================================
Ubuntu Security Notice USN-3603-1
March 20, 2018
paramiko vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Paramiko could be made to run programs if it received specially
crafted network traffic.
Software Description:
– paramiko: Python SSH2 library
Details:
Matthijs Kooijman discovered that Paramiko’s SSH server implementation
did not properly require authentication before processing requests. An
unauthenticated remote attacker could possibly use this to execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
python-paramiko 2.0.0-1ubuntu0.1
python3-paramiko 2.0.0-1ubuntu0.1
Ubuntu 16.04 LTS:
python-paramiko 1.16.0-1ubuntu0.1
python3-paramiko 1.16.0-1ubuntu0.1
Ubuntu 14.04 LTS:
python-paramiko 1.10.1-1git1ubuntu0.1
After a standard system update you need to restart any applications
using Paramiko’s server implementation to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3603-1
CVE-2018-7750
Package Information:
https://launchpad.net/ubuntu/+source/paramiko/2.0.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.16.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.10.1-1git1ubuntu0.1
—–BEGIN PGP SIGNATURE—–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=bEmo
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3603-2
March 20, 2018
paramiko vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
Paramiko could be made to run programs if it received specially
crafted network traffic.
Software Description:
– paramiko: Make ssh v2 connections with Python
Details:
USN-3603-1 fixed a vulnerability in Paramiko. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Matthijs Kooijman discovered that Paramiko’s SSH server implementation
did not properly require authentication before processing requests. An
unauthenticated remote attacker could possibly use this to execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
python-paramiko 1.7.7.1-2ubuntu1.1
After a standard system update you need to restart any applications
using Paramiko’s server implementation to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3603-2
https://usn.ubuntu.com/usn/usn-3603-1
CVE-2018-7750
—–BEGIN PGP SIGNATURE—–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=yr5K
—–END PGP SIGNATURE—–
—