common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706
people.debian.org/~nion/nmu-diff/paramiko-1.6.4-1_1.6.4-1.1.patch
security.gentoo.org/glsa/glsa-200803-07.xml
bugzilla.redhat.com/show_bug.cgi?id=428727
exchange.xforce.ibmcloud.com/vulnerabilities/39749
github.com/paramiko/paramiko
nvd.nist.gov/vuln/detail/CVE-2008-0299
web.archive.org/web/20080205095439/secunia.com/advisories/28488
web.archive.org/web/20080627172450/secunia.com/advisories/28510
web.archive.org/web/20080628232710/secunia.com/advisories/29168
web.archive.org/web/20080720033315/www.lag.net/pipermail/paramiko/2008-January/000599.html
web.archive.org/web/20081012023428/www.securityfocus.com/bid/27307
www.redhat.com/archives/fedora-package-announce/2008-January/msg00529.html
www.redhat.com/archives/fedora-package-announce/2008-January/msg00594.html