chore: allow paramiko 5.0.0 to avoid CVE-2026-44405#1743
Conversation
|
The diff is two lines but the impact is a major version bump of paramiko, the core SSH dependency used across CI passing only proves the resolver picked one compatible version, not that 5.x was exercised. How was this tested?
A range bump like this should land with a CI matrix entry pinning paramiko to the new major. Without that, users upgrading are the test. |
|
On the actual CVE impact: CVE-2026-44405 is CVSS 3.4 (Low), AV:A/AC:H. The fix (paramiko a448945) just removes For pyinfra specifically:
Net impact on pyinfra users: near zero in practice unless they're managing legacy SSH servers. This is a hardening fix in paramiko, not a critical vuln for pyinfra. The PR is still worth merging to silence scanners, but the urgency framing in #1742 is overstated and doesn't justify skipping a paramiko-5.x test run. |
I just executed the tests at https://docs.pyinfra.com/en/latest/contributing.html#tests
Yes with paramiko=5.x. types-paramiko 5.x does not yet exist.
Changelog reports these breaking changes in 5.0:
No |
Solves #1742
3.xat this time)scripts/dev-test.sh)scripts/dev-lint.sh)conventional commits format