aboutsummaryrefslogtreecommitdiff
path: root/doc/bugs/dashed_ssh_hostname_security_hole.mdwn
diff options
context:
space:
mode:
authorGravatar Joey Hess <joeyh@joeyh.name>2017-08-20 16:50:53 -0400
committerGravatar Joey Hess <joeyh@joeyh.name>2017-08-20 16:50:53 -0400
commit513ee1060c288e58a010018413e3d7c1c328cb35 (patch)
tree62d7e9c883f3f8e17f8c0c76ee28ca62c53b1bfa /doc/bugs/dashed_ssh_hostname_security_hole.mdwn
parent9f0fff3afdb530829b576e6d2d85e8deddfb71ff (diff)
CVE-2017-12976
Diffstat (limited to 'doc/bugs/dashed_ssh_hostname_security_hole.mdwn')
-rw-r--r--doc/bugs/dashed_ssh_hostname_security_hole.mdwn2
1 files changed, 2 insertions, 0 deletions
diff --git a/doc/bugs/dashed_ssh_hostname_security_hole.mdwn b/doc/bugs/dashed_ssh_hostname_security_hole.mdwn
index 048f9597b..cdae02391 100644
--- a/doc/bugs/dashed_ssh_hostname_security_hole.mdwn
+++ b/doc/bugs/dashed_ssh_hostname_security_hole.mdwn
@@ -19,6 +19,8 @@ This was fixed in version 6.20170818. Now there's a SshHost type that
is not allowed to start with a dash, and every invocation of ssh is
in a function that takes a SshHost.
+CVE-2017-12976 has been assigned for this issue.
+
[[done]]
--[[Joey]]