Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1557130 - (CVE-2018-7750) CVE-2018-7750 python-paramiko: Authentication bypass in transport.py
CVE-2018-7750 python-paramiko: Authentication bypass in transport.py
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
impact=critical,public=20180313,repor...
: Security
Depends On: 1557135 1557150 1557568 1557855 1557856 1638846 1557131 1557132 1557134 1557139 1557140 1557141 1557142 1557564 1557565 1557566 1558198 1558199 1561359 1564049 1564050 1564051 1564053 1564374 1564375 1564376 1564377 1568093 1568284
Blocks: 1557133
  Show dependency treegraph
 
Reported: 2018-03-16 00:42 EDT by Sam Fowler
Modified: 2018-10-19 17:34 EDT (History)
81 users (show)

See Also:
Fixed In Version: python-paramiko 1.17.6, python-paramiko 1.18.5, python-paramiko 2.0.8, python-paramiko 2.1.5, python-paramiko 2.2.3, python-paramiko 2.3.2, python-paramiko 2.4.1
Doc Type: If docs needed, set a value
Doc Text:
It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
yjog: needinfo-


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0591 None None None 2018-03-26 10:45 EDT
Red Hat Product Errata RHSA-2018:0646 None None None 2018-04-05 12:39 EDT
Red Hat Product Errata RHSA-2018:1124 None None None 2018-04-12 17:41 EDT
Red Hat Product Errata RHSA-2018:1125 None None None 2018-04-12 17:33 EDT
Red Hat Product Errata RHSA-2018:1213 None None None 2018-04-24 05:04 EDT
Red Hat Product Errata RHSA-2018:1274 None None None 2018-05-02 09:10 EDT
Red Hat Product Errata RHSA-2018:1328 None None None 2018-05-07 16:42 EDT
Red Hat Product Errata RHSA-2018:1525 None None None 2018-05-15 15:00 EDT
Red Hat Product Errata RHSA-2018:1972 None None None 2018-06-25 10:17 EDT

  None (edit)
Description Sam Fowler 2018-03-16 00:42:33 EDT
A flaw was found in the implementation of transport.py in Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.


Upstream Issue:

https://github.com/paramiko/paramiko/issues/1175


Upstream Patch:

https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516
Comment 1 Sam Fowler 2018-03-16 00:43:39 EDT
Created python-paramiko tracking bugs for this issue:

Affects: fedora-all [bug 1557131]
Affects: epel-all [bug 1557132]
Comment 3 Sam Fowler 2018-03-16 01:00:06 EDT
Created python-paramiko tracking bugs for this issue:

Affects: openstack-rdo [bug 1557134]
Comment 26 errata-xmlrpc 2018-03-26 10:44:50 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extras

Via RHSA-2018:0591 https://access.redhat.com/errata/RHSA-2018:0591
Comment 35 errata-xmlrpc 2018-04-05 12:38:35 EDT
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2 for RHEL 7

Via RHSA-2018:0646 https://access.redhat.com/errata/RHSA-2018:0646
Comment 36 Alfredo Moralejo 2018-04-05 13:53:28 EDT
With regards to openstack-rdo [bug 1557134], RDO uses packages in CentOS extras repo so we will get the fix for this CVE via extras repo update in CentOS. I'll keep updated bug 1557134.
Comment 42 errata-xmlrpc 2018-04-12 17:33:30 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 Advanced Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Advanced Update Support
  Red Hat Enterprise Linux 6.6 Telco Extended Update Support
  Red Hat Enterprise Linux 6.7 Extended Update Support

Via RHSA-2018:1125 https://access.redhat.com/errata/RHSA-2018:1125
Comment 43 errata-xmlrpc 2018-04-12 17:40:58 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:1124 https://access.redhat.com/errata/RHSA-2018:1124
Comment 46 errata-xmlrpc 2018-04-24 05:04:09 EDT
This issue has been addressed in the following products:

  Red Hat Ansible Engine 2.4 for RHEL 7

Via RHSA-2018:1213 https://access.redhat.com/errata/RHSA-2018:1213
Comment 49 errata-xmlrpc 2018-05-02 09:10:15 EDT
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7
  Red Hat Virtualization Engine 4.1

Via RHSA-2018:1274 https://access.redhat.com/errata/RHSA-2018:1274
Comment 50 errata-xmlrpc 2018-05-07 16:42:22 EDT
This issue has been addressed in the following products:

  CloudForms Management Engine 5.9

Via RHSA-2018:1328 https://access.redhat.com/errata/RHSA-2018:1328
Comment 51 errata-xmlrpc 2018-05-15 14:59:41 EDT
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1525 https://access.redhat.com/errata/RHSA-2018:1525
Comment 52 errata-xmlrpc 2018-06-25 10:16:53 EDT
This issue has been addressed in the following products:

  CloudForms Management Engine 5.8

Via RHSA-2018:1972 https://access.redhat.com/errata/RHSA-2018:1972
Comment 54 Riccardo Schirone 2018-10-12 11:09:17 EDT
Statement:

This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.

The following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.

* Red Hat Ceph Storage 2
* Red Hat CloudForms 4
* Red Hat Enterprise Linux 7
* Red Hat Enterprise Virtualization
* Red Hat Gluster Storage 3
* Red Hat Openshift Container Platform
* Red Hat Quick Cloud Installer
* Red Hat Satellite 6
* Red Hat Storage Console 2
* Red Hat OpenStack Platform
* Red Hat Update Infrastructure

Note You need to log in before you can comment on or make changes to this bug.