Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200803-07 ] Paramiko: Information disclosure
Date: Mon, 03 Mar 2008 21:39:54
Message-Id: 47CC7774.9090008@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200803-07
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Low
11 Title: Paramiko: Information disclosure
12 Date: March 03, 2008
13 Bugs: #205777
14 ID: 200803-07
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Unsafe randomness usage in Paramiko may allow access to sensitive
22 information.
23
24 Background
25 ==========
26
27 Paramiko is a Secure Shell Server implementation written in Python.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 dev-python/paramiko < 1.7.2 >= 1.7.2
36
37 Description
38 ===========
39
40 Dwayne C. Litzenberger reported that the file "common.py" does not
41 properly use RandomPool when using threads or forked processes.
42
43 Impact
44 ======
45
46 A remote attacker could predict the values generated by applications
47 using Paramiko for encryption purposes, potentially gaining access to
48 sensitive information.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All Paramiko users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-python/paramiko-1.7.2"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2008-0299
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0299
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200803-07.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2008 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5
96 -----BEGIN PGP SIGNATURE-----
97 Version: GnuPG v2.0.7 (GNU/Linux)
98 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
99
100 iD8DBQFHzHd0uhJ+ozIKI5gRAg0QAJ43W26KJoUkLj/zCCTJk8hcMNCWWACdG2Bm
101 IO5CIH1vE/Ts0MrtKNEcbMI=
102 =YoSJ
103 -----END PGP SIGNATURE-----
104 --
105 gentoo-announce@l.g.o mailing list