First published: Wed Aug 30 2017(Updated: )
Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/breezy | 3.0.0~bzr7290-2 3.1.0-8 3.3.2-3 3.3.4-1 | |
debian/bzr | 2.7.0+bzr6622-15 2.7.0+bzr6622+brz | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.04 | |
Canonical Bazaar | <=2.7.0 | |
redhat/bzr | <3.0 | 3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.