UBUNTU-CVE-2017-16228

Source
https://ubuntu.com/security/CVE-2017-16228
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-16228.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-16228
Upstream
Published
2017-10-29T20:29:00Z
Modified
2025-07-18T16:44:13Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.

References

Affected packages

Ubuntu:Pro:16.04:LTS / dulwich

Package

Name
dulwich
Purl
pkg:deb/ubuntu/dulwich@0.12.0-1build2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.11.2-1ubuntu1
0.12.0-1
0.12.0-1build1
0.12.0-1build2