dulwich@0.9.5 vulnerabilities

Python Git Library

  • latest version

    0.22.7

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    28 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the dulwich package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Arbitrary Command Injection

    Affected versions of this package are vulnerable to Arbitrary Command Injection when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.

    How to fix Arbitrary Command Injection?

    Upgrade dulwich to version 0.18.5 or higher.

    [,0.18.5)
    • H
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution which allows remote attackers to execute arbitrary code via a crafted pack file.

    How to fix Arbitrary Code Execution?

    Upgrade dulwich to version 0.9.9 or higher.

    [,0.9.9)
    • H
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution which allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.

    How to fix Arbitrary Code Execution?

    Upgrade dulwich to version 0.9.9 or higher.

    [,0.9.9)