diff options
author | Jeff Forcier <jeff@bitprophet.org> | 2021-11-27 14:47:21 -0500 |
---|---|---|
committer | Jeff Forcier <jeff@bitprophet.org> | 2021-11-28 20:24:17 -0500 |
commit | 656afd59f8ab2352ecead9433f841af128bf445c (patch) | |
tree | 1fefefa820ce6b7fdedc7e4d8e2106c236c4a6d4 | |
parent | 37cda1dd85430910c7867430d04ec6ac846823b2 (diff) |
Changelog re security flaw email, re #908
-rw-r--r-- | sites/www/changelog.rst | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst index 49b41f41..4ee19f82 100644 --- a/sites/www/changelog.rst +++ b/sites/www/changelog.rst @@ -2,6 +2,30 @@ Changelog ========= +- :bug:`-` (also :issue:`908`) Update `~paramiko.pkey.PKey` and subclasses to + compare (``__eq__``) via direct field/attribute comparison instead of hashing + (while retaining the existing behavior of ``__hash__`` via a slight + refactor). Big thanks to Josh Snyder and Jun Omae for the reports, and to + Josh Snyder for reproduction details & patch. + + .. warning:: + This fixes a security flaw! If you are running Paramiko on 32-bit systems + with low entropy (such as any 32-bit Python 2, or a 32-bit Python 3 which + is running with ``PYTHONHASHSEED=0``) it is possible for an attacker to + craft a new keypair from an exfiltrated public key, which Paramiko would + consider equal to the original key. + + This could enable attacks such as, but not limited to, the following: + + - Paramiko server processes would incorrectly authenticate the attacker + (using their generated private key) as if they were the victim. We see + this as the most plausible attack using this flaw. + - Paramiko client processes would incorrectly validate a connected server + (when host key verification is enabled) while subjected + to a man-in-the-middle attack. This impacts more users than the + server-side version, but also carries higher requirements for the + attacker, namely successful DNS poisoning or other MITM techniques. + - :release:`2.8.0 <2021-10-09>` - :support:`-` Administrivia overhaul, including but not limited to: |