Python Paramiko versions 2.3.2 and 2.4.1 are vulnerable to an authentication bypass in paramiko/auth_handler.py
. A remote attacker could exploit this vulnerability in Paramiko SSH servers to execute arbitrary code. Note that applications using Paramiko only as a client (such as ansible) are not affected by this.
There is also an additional fix preventing MSG_UNIMPLEMENTED
feedback loops that could manifest when both ends of a connection are Paramiko-based.
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2018-ea6b328afd
Please login to add feedback.
This update has been submitted for testing by pghmcfc.
This update has been pushed to testing.
no regressions noted
works for me
This update has been submitted for batched by bodhi.
This update has been submitted for stable by bodhi.
This update has been pushed to stable.