CVE-2017-14176

NameCVE-2017-14176
DescriptionBazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1107-1, DSA-4052-1
Debian Bugs874429

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
breezy (PTS)buster3.0.0~bzr7290-2fixed
bullseye3.1.0-8fixed
bookworm3.3.2-3fixed
sid, trixie3.3.9-1fixed
bzr (PTS)jessie, jessie (lts)2.6.0+bzr6595-6+deb8u1fixed
stretch (security), stretch (lts), stretch2.7.0+bzr6619-7+deb9u1fixed
buster2.7.0+bzr6622-15fixed
sid, trixie, bullseye, bookworm2.7.0+bzr6622+brzfixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
breezysource(unstable)3.0.0~bzr6772-1
bzrsourcewheezy2.6.0~bzr6526-1+deb7u1DLA-1107-1
bzrsourcejessie2.6.0+bzr6595-6+deb8u1DSA-4052-1
bzrsourcestretch2.7.0+bzr6619-7+deb9u1DSA-4052-1
bzrsource(unstable)2.7.0+bzr6622-7874429

Notes

https://bugs.launchpad.net/bzr/+bug/1710979

Search for package or bug name: Reporting problems