You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa paramiko

Sigurnosni nedostatak programskog paketa paramiko

==========================================================================
Ubuntu Security Notice USN-3603-1
March 20, 2018

paramiko vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Paramiko could be made to run programs if it received specially
crafted network traffic.

Software Description:
– paramiko: Python SSH2 library

Details:

Matthijs Kooijman discovered that Paramiko’s SSH server implementation
did not properly require authentication before processing requests. An
unauthenticated remote attacker could possibly use this to execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
python-paramiko 2.0.0-1ubuntu0.1
python3-paramiko 2.0.0-1ubuntu0.1

Ubuntu 16.04 LTS:
python-paramiko 1.16.0-1ubuntu0.1
python3-paramiko 1.16.0-1ubuntu0.1

Ubuntu 14.04 LTS:
python-paramiko 1.10.1-1git1ubuntu0.1

After a standard system update you need to restart any applications
using Paramiko’s server implementation to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3603-1
CVE-2018-7750

Package Information:
https://launchpad.net/ubuntu/+source/paramiko/2.0.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.16.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.10.1-1git1ubuntu0.1

—–BEGIN PGP SIGNATURE—–
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=bEmo
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3603-2
March 20, 2018

paramiko vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Paramiko could be made to run programs if it received specially
crafted network traffic.

Software Description:
– paramiko: Make ssh v2 connections with Python

Details:

USN-3603-1 fixed a vulnerability in Paramiko. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Matthijs Kooijman discovered that Paramiko’s SSH server implementation
did not properly require authentication before processing requests. An
unauthenticated remote attacker could possibly use this to execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
python-paramiko 1.7.7.1-2ubuntu1.1

After a standard system update you need to restart any applications
using Paramiko’s server implementation to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3603-2
https://usn.ubuntu.com/usn/usn-3603-1
CVE-2018-7750

—–BEGIN PGP SIGNATURE—–
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=yr5K
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa collectd

Otkriven je sigurnosni nedostatak u programskom paketu collectd za operacijski sustav Red Hat. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada...

Close