Search for packages
| purl | pkg:deb/debian/paramiko@2.4.2-0.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-48v8-gpz1-cfcd
Aliases: CVE-2022-24302 GHSA-f8q4-jwww-x3wv PYSEC-2022-166 |
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3jh2-znva-2bb6 | transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step. |
CVE-2018-7750
GHSA-232r-66cg-79px PYSEC-2018-19 |
| VCID-9qz7-3cqa-tyd3 | Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity. |
CVE-2018-1000805
GHSA-f2j6-wrhh-v25m PYSEC-2018-69 |