Your submission was sent successfully! Close

CVE-2017-16228

Published: 29 October 2017

Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
dulwich
Launchpad, Ubuntu, Debian
Upstream
Released (0.18.5-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(0.18.5-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(0.18.5-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.18.5-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.18.5-1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Patches:
Upstream: https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/