[USN-3603-1] Paramiko vulnerability
Steve Beattie
steve.beattie at canonical.com
Tue Mar 20 19:31:20 UTC 2018
==========================================================================
Ubuntu Security Notice USN-3603-1
March 20, 2018
paramiko vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Paramiko could be made to run programs if it received specially
crafted network traffic.
Software Description:
- paramiko: Python SSH2 library
Details:
Matthijs Kooijman discovered that Paramiko's SSH server implementation
did not properly require authentication before processing requests. An
unauthenticated remote attacker could possibly use this to execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
python-paramiko 2.0.0-1ubuntu0.1
python3-paramiko 2.0.0-1ubuntu0.1
Ubuntu 16.04 LTS:
python-paramiko 1.16.0-1ubuntu0.1
python3-paramiko 1.16.0-1ubuntu0.1
Ubuntu 14.04 LTS:
python-paramiko 1.10.1-1git1ubuntu0.1
After a standard system update you need to restart any applications
using Paramiko's server implementation to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3603-1
CVE-2018-7750
Package Information:
https://launchpad.net/ubuntu/+source/paramiko/2.0.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.16.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/paramiko/1.10.1-1git1ubuntu0.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20180320/61c56382/attachment.sig>
More information about the ubuntu-security-announce
mailing list