blob: bcb1ffd911b2d1537950034b8a9b67069da2705a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200803-07">
<title>Paramiko: Information disclosure</title>
Unsafe randomness usage in Paramiko may allow access to sensitive
<product type="ebuild">paramiko</product>
<announced>March 03, 2008</announced>
<revised>March 03, 2008: 01</revised>
<package name="dev-python/paramiko" auto="yes" arch="*">
<unaffected range="ge">1.7.2</unaffected>
<vulnerable range="lt">1.7.2</vulnerable>
Paramiko is a Secure Shell Server implementation written in Python.
Dwayne C. Litzenberger reported that the file "" does not
properly use RandomPool when using threads or forked processes.
<impact type="low">
A remote attacker could predict the values generated by applications
using Paramiko for encryption purposes, potentially gaining access to
sensitive information.
There is no known workaround at this time.
All Paramiko users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-python/paramiko-1.7.2&quot;</code>
<uri link="">CVE-2008-0299</uri>
<metadata tag="requester" timestamp="Mon, 11 Feb 2008 18:32:09 +0000">
<metadata tag="bugReady" timestamp="Mon, 11 Feb 2008 18:33:24 +0000">
<metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:43:49 +0000">