Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-16228 (GCVE-0-2017-16228)
Vulnerability from cvelistv5 – Published: 2017-10-29 20:00 – Updated: 2024-08-05 20:20
VLAI?
EPSS
Summary
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Date Public ?
2017-10-29 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:20:05.213Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://tracker.debian.org/news/882440"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dulwich.io/code/dulwich/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-10-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-29T20:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://tracker.debian.org/news/882440"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dulwich.io/code/dulwich/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16228",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tracker.debian.org/news/882440",
"refsource": "MISC",
"url": "https://tracker.debian.org/news/882440"
},
{
"name": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/",
"refsource": "MISC",
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"name": "https://www.dulwich.io/code/dulwich/",
"refsource": "MISC",
"url": "https://www.dulwich.io/code/dulwich/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-16228",
"datePublished": "2017-10-29T20:00:00.000Z",
"dateReserved": "2017-10-29T00:00:00.000Z",
"dateUpdated": "2024-08-05T20:20:05.213Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-16228",
"date": "2026-04-19",
"epss": "0.00424",
"percentile": "0.6224"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-16228\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-29T20:29:00.237\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.\"},{\"lang\":\"es\",\"value\":\"Dulwich en versiones anteriores a la 0.18.5, cuando se utiliza un subproceso SSH, perote que atacantes remotos ejecuten comandos arbitrarios mediante una URL ssh con un car\u00e1cter gui\u00f3n inicial en el nombre del host. Esta vulnerabilidad est\u00e1 relacioada con CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dulwich_project:dulwich:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.18.4\",\"matchCriteriaId\":\"9358D52F-0A29-4343-8F98-FC6575BAB78E\"}]}]}],\"references\":[{\"url\":\"https://tracker.debian.org/news/882440\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.dulwich.io/code/dulwich/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\",\"Vendor Advisory\"]},{\"url\":\"https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tracker.debian.org/news/882440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.dulwich.io/code/dulwich/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Vendor Advisory\"]},{\"url\":\"https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
PYSEC-2017-12
Vulnerability from pysec - Published: 2017-10-29 20:29 - Updated: 2021-07-05 00:01
VLAI?
Details
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
Impacted products
| Name | purl | dulwich | pkg:pypi/dulwich |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "dulwich",
"purl": "pkg:pypi/dulwich"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.18.5"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.0.1",
"0.1.0",
"0.1.1",
"0.10.0",
"0.10.1a",
"0.11.0",
"0.11.1",
"0.11.2",
"0.12.0",
"0.13.0",
"0.14.0",
"0.14.1",
"0.15.0",
"0.16.0",
"0.16.1",
"0.16.2",
"0.16.3",
"0.17.1",
"0.17.2",
"0.17.3",
"0.18.0",
"0.18.1",
"0.18.2",
"0.18.3",
"0.18.4",
"0.2.1",
"0.3.0",
"0.3.1",
"0.3.2",
"0.3.3",
"0.4.0",
"0.4.1",
"0.5.0",
"0.6.0",
"0.6.1",
"0.6.2",
"0.7.0",
"0.7.1",
"0.8.0",
"0.8.1",
"0.8.2",
"0.8.3",
"0.8.4",
"0.8.5",
"0.8.6",
"0.8.7",
"0.9.0",
"0.9.1",
"0.9.2",
"0.9.3",
"0.9.4",
"0.9.5",
"0.9.6",
"0.9.7",
"0.9.8",
"0.9.9"
]
}
],
"aliases": [
"CVE-2017-16228"
],
"details": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"id": "PYSEC-2017-12",
"modified": "2021-07-05T00:01:21.470158Z",
"published": "2017-10-29T20:29:00Z",
"references": [
{
"type": "WEB",
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"type": "WEB",
"url": "https://www.dulwich.io/code/dulwich/"
},
{
"type": "WEB",
"url": "https://tracker.debian.org/news/882440"
}
]
}
GSD-2017-16228
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-16228",
"description": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"id": "GSD-2017-16228",
"references": [
"https://www.suse.com/security/cve/CVE-2017-16228.html",
"https://advisories.mageia.org/CVE-2017-16228.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-16228"
],
"details": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"id": "GSD-2017-16228",
"modified": "2023-12-13T01:21:00.863705Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16228",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tracker.debian.org/news/882440",
"refsource": "MISC",
"url": "https://tracker.debian.org/news/882440"
},
{
"name": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/",
"refsource": "MISC",
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"name": "https://www.dulwich.io/code/dulwich/",
"refsource": "MISC",
"url": "https://www.dulwich.io/code/dulwich/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=0.18.4",
"affected_versions": "All versions up to 0.18.4",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2019-10-03",
"description": "Remote attackers could execute arbitrary commands via an SSH URL with an initial dash character in the hostname.",
"fixed_versions": [
"0.18.5"
],
"identifier": "CVE-2017-16228",
"identifiers": [
"CVE-2017-16228"
],
"not_impacted": "All versions after 0.18.4",
"package_slug": "pypi/dulwich",
"pubdate": "2017-10-29",
"solution": "Upgrade to version 0.18.5 or above.",
"title": "Command Injection",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-16228",
"https://tracker.debian.org/news/882440",
"https://www.dulwich.io/code/dulwich/"
],
"uuid": "c825b44e-5c38-4a1d-a55c-a218efe76759"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:dulwich_project:dulwich:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.18.4",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-16228"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"name": "https://www.dulwich.io/code/dulwich/",
"refsource": "MISC",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/"
},
{
"name": "https://tracker.debian.org/news/882440",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://tracker.debian.org/news/882440"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2017-10-29T20:29Z"
}
}
}
OPENSUSE-SU-2024:14139-1
Vulnerability from csaf_opensuse - Published: 2024-07-12 00:00 - Updated: 2024-07-12 00:00Summary
python310-dulwich-0.21.7-1.3 on GA media
Severity
Moderate
Notes
Title of the patch: python310-dulwich-0.21.7-1.3 on GA media
Description of the patch: These are all security issues fixed in the python310-dulwich-0.21.7-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-14139
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-dulwich-0.21.7-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-dulwich-0.21.7-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14139",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14139-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0838 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16228 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16228/"
}
],
"title": "python310-dulwich-0.21.7-1.3 on GA media",
"tracking": {
"current_release_date": "2024-07-12T00:00:00Z",
"generator": {
"date": "2024-07-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14139-1",
"initial_release_date": "2024-07-12T00:00:00Z",
"revision_history": [
{
"date": "2024-07-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-dulwich-0.21.7-1.3.aarch64",
"product": {
"name": "python310-dulwich-0.21.7-1.3.aarch64",
"product_id": "python310-dulwich-0.21.7-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "python311-dulwich-0.21.7-1.3.aarch64",
"product": {
"name": "python311-dulwich-0.21.7-1.3.aarch64",
"product_id": "python311-dulwich-0.21.7-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "python312-dulwich-0.21.7-1.3.aarch64",
"product": {
"name": "python312-dulwich-0.21.7-1.3.aarch64",
"product_id": "python312-dulwich-0.21.7-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-dulwich-0.21.7-1.3.ppc64le",
"product": {
"name": "python310-dulwich-0.21.7-1.3.ppc64le",
"product_id": "python310-dulwich-0.21.7-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-dulwich-0.21.7-1.3.ppc64le",
"product": {
"name": "python311-dulwich-0.21.7-1.3.ppc64le",
"product_id": "python311-dulwich-0.21.7-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-dulwich-0.21.7-1.3.ppc64le",
"product": {
"name": "python312-dulwich-0.21.7-1.3.ppc64le",
"product_id": "python312-dulwich-0.21.7-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-dulwich-0.21.7-1.3.s390x",
"product": {
"name": "python310-dulwich-0.21.7-1.3.s390x",
"product_id": "python310-dulwich-0.21.7-1.3.s390x"
}
},
{
"category": "product_version",
"name": "python311-dulwich-0.21.7-1.3.s390x",
"product": {
"name": "python311-dulwich-0.21.7-1.3.s390x",
"product_id": "python311-dulwich-0.21.7-1.3.s390x"
}
},
{
"category": "product_version",
"name": "python312-dulwich-0.21.7-1.3.s390x",
"product": {
"name": "python312-dulwich-0.21.7-1.3.s390x",
"product_id": "python312-dulwich-0.21.7-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-dulwich-0.21.7-1.3.x86_64",
"product": {
"name": "python310-dulwich-0.21.7-1.3.x86_64",
"product_id": "python310-dulwich-0.21.7-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "python311-dulwich-0.21.7-1.3.x86_64",
"product": {
"name": "python311-dulwich-0.21.7-1.3.x86_64",
"product_id": "python311-dulwich-0.21.7-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "python312-dulwich-0.21.7-1.3.x86_64",
"product": {
"name": "python312-dulwich-0.21.7-1.3.x86_64",
"product_id": "python312-dulwich-0.21.7-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dulwich-0.21.7-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64"
},
"product_reference": "python310-dulwich-0.21.7-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dulwich-0.21.7-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le"
},
"product_reference": "python310-dulwich-0.21.7-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dulwich-0.21.7-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x"
},
"product_reference": "python310-dulwich-0.21.7-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dulwich-0.21.7-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64"
},
"product_reference": "python310-dulwich-0.21.7-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dulwich-0.21.7-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64"
},
"product_reference": "python311-dulwich-0.21.7-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dulwich-0.21.7-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le"
},
"product_reference": "python311-dulwich-0.21.7-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dulwich-0.21.7-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x"
},
"product_reference": "python311-dulwich-0.21.7-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dulwich-0.21.7-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64"
},
"product_reference": "python311-dulwich-0.21.7-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dulwich-0.21.7-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64"
},
"product_reference": "python312-dulwich-0.21.7-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dulwich-0.21.7-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le"
},
"product_reference": "python312-dulwich-0.21.7-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dulwich-0.21.7-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x"
},
"product_reference": "python312-dulwich-0.21.7-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dulwich-0.21.7-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
},
"product_reference": "python312-dulwich-0.21.7-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-0838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0838"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0838",
"url": "https://www.suse.com/security/cve/CVE-2015-0838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-0838"
},
{
"cve": "CVE-2017-16228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16228"
}
],
"notes": [
{
"category": "general",
"text": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16228",
"url": "https://www.suse.com/security/cve/CVE-2017-16228"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python310-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python311-dulwich-0.21.7-1.3.x86_64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.aarch64",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.ppc64le",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.s390x",
"openSUSE Tumbleweed:python312-dulwich-0.21.7-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16228"
}
]
}
OPENSUSE-SU-2024:11228-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
python36-dulwich-0.20.24-1.3 on GA media
Severity
Moderate
Notes
Title of the patch: python36-dulwich-0.20.24-1.3 on GA media
Description of the patch: These are all security issues fixed in the python36-dulwich-0.20.24-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11228
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python36-dulwich-0.20.24-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python36-dulwich-0.20.24-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11228",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11228-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0838 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16228 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16228/"
}
],
"title": "python36-dulwich-0.20.24-1.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11228-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python36-dulwich-0.20.24-1.3.aarch64",
"product": {
"name": "python36-dulwich-0.20.24-1.3.aarch64",
"product_id": "python36-dulwich-0.20.24-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "python38-dulwich-0.20.24-1.3.aarch64",
"product": {
"name": "python38-dulwich-0.20.24-1.3.aarch64",
"product_id": "python38-dulwich-0.20.24-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "python39-dulwich-0.20.24-1.3.aarch64",
"product": {
"name": "python39-dulwich-0.20.24-1.3.aarch64",
"product_id": "python39-dulwich-0.20.24-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-dulwich-0.20.24-1.3.ppc64le",
"product": {
"name": "python36-dulwich-0.20.24-1.3.ppc64le",
"product_id": "python36-dulwich-0.20.24-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-dulwich-0.20.24-1.3.ppc64le",
"product": {
"name": "python38-dulwich-0.20.24-1.3.ppc64le",
"product_id": "python38-dulwich-0.20.24-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-dulwich-0.20.24-1.3.ppc64le",
"product": {
"name": "python39-dulwich-0.20.24-1.3.ppc64le",
"product_id": "python39-dulwich-0.20.24-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-dulwich-0.20.24-1.3.s390x",
"product": {
"name": "python36-dulwich-0.20.24-1.3.s390x",
"product_id": "python36-dulwich-0.20.24-1.3.s390x"
}
},
{
"category": "product_version",
"name": "python38-dulwich-0.20.24-1.3.s390x",
"product": {
"name": "python38-dulwich-0.20.24-1.3.s390x",
"product_id": "python38-dulwich-0.20.24-1.3.s390x"
}
},
{
"category": "product_version",
"name": "python39-dulwich-0.20.24-1.3.s390x",
"product": {
"name": "python39-dulwich-0.20.24-1.3.s390x",
"product_id": "python39-dulwich-0.20.24-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python36-dulwich-0.20.24-1.3.x86_64",
"product": {
"name": "python36-dulwich-0.20.24-1.3.x86_64",
"product_id": "python36-dulwich-0.20.24-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "python38-dulwich-0.20.24-1.3.x86_64",
"product": {
"name": "python38-dulwich-0.20.24-1.3.x86_64",
"product_id": "python38-dulwich-0.20.24-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "python39-dulwich-0.20.24-1.3.x86_64",
"product": {
"name": "python39-dulwich-0.20.24-1.3.x86_64",
"product_id": "python39-dulwich-0.20.24-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dulwich-0.20.24-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64"
},
"product_reference": "python36-dulwich-0.20.24-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dulwich-0.20.24-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le"
},
"product_reference": "python36-dulwich-0.20.24-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dulwich-0.20.24-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x"
},
"product_reference": "python36-dulwich-0.20.24-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-dulwich-0.20.24-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64"
},
"product_reference": "python36-dulwich-0.20.24-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dulwich-0.20.24-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64"
},
"product_reference": "python38-dulwich-0.20.24-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dulwich-0.20.24-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le"
},
"product_reference": "python38-dulwich-0.20.24-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dulwich-0.20.24-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x"
},
"product_reference": "python38-dulwich-0.20.24-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dulwich-0.20.24-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64"
},
"product_reference": "python38-dulwich-0.20.24-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dulwich-0.20.24-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64"
},
"product_reference": "python39-dulwich-0.20.24-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dulwich-0.20.24-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le"
},
"product_reference": "python39-dulwich-0.20.24-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dulwich-0.20.24-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x"
},
"product_reference": "python39-dulwich-0.20.24-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dulwich-0.20.24-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
},
"product_reference": "python39-dulwich-0.20.24-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-0838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0838"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0838",
"url": "https://www.suse.com/security/cve/CVE-2015-0838"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-0838"
},
{
"cve": "CVE-2017-16228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16228"
}
],
"notes": [
{
"category": "general",
"text": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16228",
"url": "https://www.suse.com/security/cve/CVE-2017-16228"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python36-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python38-dulwich-0.20.24-1.3.x86_64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.aarch64",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.ppc64le",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.s390x",
"openSUSE Tumbleweed:python39-dulwich-0.20.24-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16228"
}
]
}
CNVD-2017-35654
Vulnerability from cnvd - Published: 2017-11-30
VLAI Severity ?
Title
Dulwich任意命令执行漏洞
Description
Dulwich是软件开发者Jelmer Vernooij所研发的一个使用了Git版本控制系统的文件格式和协议的Python实现。
Dulwich 0.18.5之前的版本中存在安全漏洞。当SSH子进程被使用时,远程攻击者可借助主机名中带有初始破折号的ssh URL利用该漏洞执行任意命令。
Severity
高
Patch Name
Dulwich任意命令执行漏洞的补丁
Patch Description
Dulwich是软件开发者Jelmer Vernooij所研发的一个使用了Git版本控制系统的文件格式和协议的Python实现。
Dulwich 0.18.5之前的版本中存在安全漏洞。当SSH子进程被使用时,远程攻击者可借助主机名中带有初始破折号的ssh URL利用该漏洞执行任意命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.dulwich.io/code/dulwich/
Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-16228
Impacted products
| Name | Dulwich Dulwich <0.18.5 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-16228"
}
},
"description": "Dulwich\u662f\u8f6f\u4ef6\u5f00\u53d1\u8005Jelmer Vernooij\u6240\u7814\u53d1\u7684\u4e00\u4e2a\u4f7f\u7528\u4e86Git\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u7684\u6587\u4ef6\u683c\u5f0f\u548c\u534f\u8bae\u7684Python\u5b9e\u73b0\u3002\r\n\r\nDulwich 0.18.5\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u5f53SSH\u5b50\u8fdb\u7a0b\u88ab\u4f7f\u7528\u65f6\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u4e3b\u673a\u540d\u4e2d\u5e26\u6709\u521d\u59cb\u7834\u6298\u53f7\u7684ssh URL\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002",
"discovererName": "unknown",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.dulwich.io/code/dulwich/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-35654",
"openTime": "2017-11-30",
"patchDescription": "Dulwich\u662f\u8f6f\u4ef6\u5f00\u53d1\u8005Jelmer Vernooij\u6240\u7814\u53d1\u7684\u4e00\u4e2a\u4f7f\u7528\u4e86Git\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u7684\u6587\u4ef6\u683c\u5f0f\u548c\u534f\u8bae\u7684Python\u5b9e\u73b0\u3002\r\n\r\nDulwich 0.18.5\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u5f53SSH\u5b50\u8fdb\u7a0b\u88ab\u4f7f\u7528\u65f6\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u4e3b\u673a\u540d\u4e2d\u5e26\u6709\u521d\u59cb\u7834\u6298\u53f7\u7684ssh URL\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Dulwich\u4efb\u610f\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Dulwich Dulwich \u003c0.18.5"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-16228",
"serverity": "\u9ad8",
"submitTime": "2017-10-31",
"title": "Dulwich\u4efb\u610f\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e"
}
SUSE-SU-2018:2047-1
Vulnerability from csaf_suse - Published: 2018-07-24 07:20 - Updated: 2018-07-24 07:20Summary
Security update for python-dulwich
Severity
Moderate
Notes
Title of the patch: Security update for python-dulwich
Description of the patch: This update for python-dulwich to version 0.18.5 fixes this security issue:
- CVE-2017-16228: Dulwich, when an SSH subprocess is used, allowed remote
attackers to execute arbitrary commands via an ssh URL with an initial dash
character in the hostname (bsc#1066430).
For detailed changes please see https://www.dulwich.io/code/dulwich/
Patchnames: SUSE-SLE-Module-Public-Cloud-12-2018-1382
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-dulwich",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-dulwich to version 0.18.5 fixes this security issue:\n\n- CVE-2017-16228: Dulwich, when an SSH subprocess is used, allowed remote\n attackers to execute arbitrary commands via an ssh URL with an initial dash\n character in the hostname (bsc#1066430).\n\nFor detailed changes please see https://www.dulwich.io/code/dulwich/\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2018-1382",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2047-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2047-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182047-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2047-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004303.html"
},
{
"category": "self",
"summary": "SUSE Bug 1066430",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16228 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16228/"
}
],
"title": "Security update for python-dulwich",
"tracking": {
"current_release_date": "2018-07-24T07:20:39Z",
"generator": {
"date": "2018-07-24T07:20:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2047-1",
"initial_release_date": "2018-07-24T07:20:39Z",
"revision_history": [
{
"date": "2018-07-24T07:20:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-dulwich-0.18.5-4.3.1.aarch64",
"product": {
"name": "python-dulwich-0.18.5-4.3.1.aarch64",
"product_id": "python-dulwich-0.18.5-4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-dulwich-0.18.5-4.3.1.ppc64le",
"product": {
"name": "python-dulwich-0.18.5-4.3.1.ppc64le",
"product_id": "python-dulwich-0.18.5-4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-dulwich-0.18.5-4.3.1.s390x",
"product": {
"name": "python-dulwich-0.18.5-4.3.1.s390x",
"product_id": "python-dulwich-0.18.5-4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-dulwich-0.18.5-4.3.1.x86_64",
"product": {
"name": "python-dulwich-0.18.5-4.3.1.x86_64",
"product_id": "python-dulwich-0.18.5-4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dulwich-0.18.5-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.aarch64"
},
"product_reference": "python-dulwich-0.18.5-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dulwich-0.18.5-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.ppc64le"
},
"product_reference": "python-dulwich-0.18.5-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dulwich-0.18.5-4.3.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.s390x"
},
"product_reference": "python-dulwich-0.18.5-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-dulwich-0.18.5-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.x86_64"
},
"product_reference": "python-dulwich-0.18.5-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-16228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16228"
}
],
"notes": [
{
"category": "general",
"text": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16228",
"url": "https://www.suse.com/security/cve/CVE-2017-16228"
},
{
"category": "external",
"summary": "SUSE Bug 1053364 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1053364"
},
{
"category": "external",
"summary": "SUSE Bug 1066430 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1066430"
},
{
"category": "external",
"summary": "SUSE Bug 1071709 for CVE-2017-16228",
"url": "https://bugzilla.suse.com/1071709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 12:python-dulwich-0.18.5-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-24T07:20:39Z",
"details": "moderate"
}
],
"title": "CVE-2017-16228"
}
]
}
GHSA-CWWH-4382-6FWR
Vulnerability from github – Published: 2022-05-13 01:44 – Updated: 2024-09-20 16:44
VLAI?
Summary
Dulwich RCE Vulnerability
Details
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
Severity ?
9.8 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "dulwich"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.18.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-16228"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2023-07-26T18:23:19Z",
"nvd_published_at": "2017-10-29T20:29:00Z",
"severity": "CRITICAL"
},
"details": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.",
"id": "GHSA-cwwh-4382-6fwr",
"modified": "2024-09-20T16:44:56Z",
"published": "2022-05-13T01:44:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16228"
},
{
"type": "WEB",
"url": "https://github.com/jelmer/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6"
},
{
"type": "PACKAGE",
"url": "https://github.com/jelmer/dulwich"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/dulwich/PYSEC-2017-12.yaml"
},
{
"type": "WEB",
"url": "https://tracker.debian.org/news/882440"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20201220231743/https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20210128154006/https://www.dulwich.io/code/dulwich"
},
{
"type": "WEB",
"url": "https://www.dulwich.io/code/dulwich"
},
{
"type": "WEB",
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Dulwich RCE Vulnerability"
}
FKIE_CVE-2017-16228
Vulnerability from fkie_nvd - Published: 2017-10-29 20:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://tracker.debian.org/news/882440 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://www.dulwich.io/code/dulwich/ | Product, Vendor Advisory | |
| cve@mitre.org | https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/ | Issue Tracking, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tracker.debian.org/news/882440 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.dulwich.io/code/dulwich/ | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/ | Issue Tracking, Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dulwich_project | dulwich | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dulwich_project:dulwich:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9358D52F-0A29-4343-8F98-FC6575BAB78E",
"versionEndIncluding": "0.18.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
},
{
"lang": "es",
"value": "Dulwich en versiones anteriores a la 0.18.5, cuando se utiliza un subproceso SSH, perote que atacantes remotos ejecuten comandos arbitrarios mediante una URL ssh con un car\u00e1cter gui\u00f3n inicial en el nombre del host. Esta vulnerabilidad est\u00e1 relacioada con CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117."
}
],
"id": "CVE-2017-16228",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-29T20:29:00.237",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://tracker.debian.org/news/882440"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://tracker.debian.org/news/882440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://www.dulwich.io/code/dulwich/commit/7116a0cbbda571f7dac863f4b1c00b6e16d6d8d6/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…