Bug 30193 - python-paramiko new security issue CVE-2022-24302
Summary: python-paramiko new security issue CVE-2022-24302
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-03-21 21:45 CET by David Walser
Modified: 2022-04-09 23:21 CEST (History)
6 users (show)

See Also:
Source RPM: python-paramiko-2.7.2-1.mga8.src.rpm
CVE: CVE-2022-24302
Status comment:


Attachments

Description David Walser 2022-03-21 21:45:24 CET
Debian-LTS has issued an advisory today (March 21):
https://www.debian.org/lts/security/2022/dla-2959

The issue is fixed upstream in 2.10.1.

Mageia 8 is also affected.
David Walser 2022-03-21 21:45:35 CET

Whiteboard: (none) => MGA8TOO
Status comment: (none) => Fixed upstream in 2.10.1

Comment 1 Lewis Smith 2022-03-22 20:52:59 CET
Many different people have maintained this, so have to assign it globally.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2022-03-23 15:49:51 CET
Suggested advisory:
========================

The updated package fixes a security vulnerability:

In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. (CVE-2022-24302)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24302
https://www.debian.org/lts/security/2022/dla-2959
========================

Updated package in core/updates_testing:
========================
python3-paramiko-2.7.2-1.1.mga8

from SRPM:
python-paramiko-2.7.2-1.1.mga8.src.rpm

Assignee: pkg-bugs => qa-bugs
Source RPM: python-paramiko-2.7.2-3.mga9.src.rpm => python-paramiko-2.7.2-1.mga8.src.rpm
CVE: (none) => CVE-2022-24302
Version: Cauldron => 8
Status: NEW => ASSIGNED
Status comment: Fixed upstream in 2.10.1 => (none)
Whiteboard: MGA8TOO => (none)
CC: (none) => nicolas.salguero

Comment 3 Herman Viaene 2022-03-26 15:12:27 CET
MGA8-64 Plasma on Lenovo B50 in Dutch
No installation issues.
Ref bug 25904 for testing, but I have no idea (well, only a little) what this is about. Leaving for others.

CC: (none) => herman.viaene

Comment 4 David Walser 2022-03-29 00:43:26 CEST
Ubuntu has issued an advisory for this today (March 28):
https://ubuntu.com/security/notices/USN-5351-1
Comment 5 David Walser 2022-03-29 01:42:42 CEST
Fedora has issued an advisory for this on March 26:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/
Comment 6 Len Lawrence 2022-04-08 20:21:32 CEST
mga8, x64

Installed python-paramiko before updating.  That dragged in a lot of extra packages.  Found a script at stackoverflow which exercises python-paramiko.  Modified it for local use and tried to run it.  It is supposed to run a couple of commands on a machine elsewhere on the LAN but I could not get past the passphrase stage for SSL - forgotten what it was but accepted that the script was working as far as paramiko is concerned and backed out.

After updating I tried out duplicity, one of the few applications which use paramiko.  Not sure if I was running it correctly but it appeared to be performing a direct backup (file copies).  Ran the restore command under strace for a subdirectory of the data.
In both cases the user has to enter the passphrase for the key - it seems to use the GNOME keyring - .gpg files.

$ duplicity full /data/images file:///run/media/lcl/gemma/
$ strace -o duplicity.trace duplicity restore Bournemouth file:///run/media/lcl/gemma/images
$ grep paramiko duplicity.trace
stat("/usr/lib64/python3.8/site-packages/duplicity/backends/ssh_paramiko_backend.py", {st_mode=S_IFREG|0644, st_size=19122, ...}) = 0
stat("/usr/lib64/python3.8/site-packages/duplicity/backends/ssh_paramiko_backend.py", {st_mode=S_IFREG|0644, st_size=19122, ...}) = 0
openat(AT_FDCWD, "/usr/lib64/python3.8/site-packages/duplicity/backends/__pycache__/ssh_paramiko_backend.cpython-38.pyc", O_RDONLY|O_CLOEXEC) = 3

That is as far as I can take this - all a bit above my pay grade.
Giving it an OK for 64-bits.

CC: (none) => tarazed25
Whiteboard: (none) => MGA8-64-OK

Comment 7 Thomas Andrews 2022-04-09 00:15:22 CEST
A good effort, guys.

Validating. Advisory in Comment 2.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2022-04-09 19:54:48 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 8 Mageia Robot 2022-04-09 23:21:46 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0132.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.