Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/dulwich@1.1.0-3?distro=trixie
purl pkg:deb/debian/dulwich@1.1.0-3?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-74n4-53mc-2uc3 The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree. CVE-2014-9706
GHSA-4j5j-58j7-6c3w
PYSEC-2015-34
VCID-duga-b9sn-b7fc Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file. CVE-2015-0838
GHSA-vjjf-3rvg-gv3v
PYSEC-2015-35
VCID-j1c4-rux6-wygr Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. CVE-2014-9390
GHSA-6vvc-c2m3-cjf3
PYSEC-2020-217
VCID-wegc-1zcu-qygw Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117. CVE-2017-16228
GHSA-cwwh-4382-6fwr
PYSEC-2017-12

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:09:45.767717+00:00 Debian Importer Fixing VCID-wegc-1zcu-qygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:41.338417+00:00 Debian Importer Fixing VCID-duga-b9sn-b7fc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:20.876472+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:20.095821+00:00 Debian Importer Fixing VCID-74n4-53mc-2uc3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:19:02.465355+00:00 Debian Importer Fixing VCID-wegc-1zcu-qygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:56.412241+00:00 Debian Importer Fixing VCID-duga-b9sn-b7fc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:41.880378+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:30.677331+00:00 Debian Importer Fixing VCID-74n4-53mc-2uc3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:13:54.365478+00:00 Debian Importer Fixing VCID-wegc-1zcu-qygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:42.371530+00:00 Debian Importer Fixing VCID-duga-b9sn-b7fc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:16.323607+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:53.428813+00:00 Debian Importer Fixing VCID-74n4-53mc-2uc3 https://security-tracker.debian.org/tracker/data/json 38.1.0