diff options
author | Jeff Forcier <jeff@bitprophet.org> | 2018-09-18 20:00:48 -0700 |
---|---|---|
committer | Jeff Forcier <jeff@bitprophet.org> | 2018-09-18 20:00:48 -0700 |
commit | 0394fee33f31bd7eadfc8ed941a214b401eccbeb (patch) | |
tree | c9d9836642f144e31c4dc5470b6c6eb154dc1de7 /sites | |
parent | 21b84a794acf3acefdcbf9db9762b162ee02bd25 (diff) | |
parent | e01e96bab13613352da8429b70de88b7165ec8ab (diff) |
Merge branch '2.4'
Diffstat (limited to 'sites')
-rw-r--r-- | sites/www/changelog.rst | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst index e1ab27ba..0fbb1e63 100644 --- a/sites/www/changelog.rst +++ b/sites/www/changelog.rst @@ -2,6 +2,23 @@ Changelog ========= +- :bug:`-` Modify protocol message handling such that ``Transport`` does not + respond to ``MSG_UNIMPLEMENTED`` with its own ``MSG_UNIMPLEMENTED`` message. + This behavior probably didn't cause any outright errors, but it doesn't seem + to conform to the RFCs and could cause (non-infinite) feedback loops in some + scenarios (usually those involving Paramiko on both ends). +- :bug:`1283 (1.17+)` Fix exploit (CVE pending) in Paramiko's server mode + (**not** client mode) where hostile clients could trick the server into + thinking they were authenticated without actually submitting valid + authentication. + + Specifically, steps have been taken to start separating client and server + related message types in the message handling tables within ``Transport`` and + ``AuthHandler``; this work is not complete but enough has been performed to + close off this particular exploit (which was the only obvious such exploit + for this particular channel). + + Thanks to Daniel Hoffman for the detailed report. - :support:`1292 backported` Backport changes from :issue:`979` (added in Paramiko 2.3) to Paramiko 2.0-2.2, using duck-typing to preserve backwards compatibility. This allows these older versions to use newer Cryptography |