|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for mercurial RHSA-2017:2489-01|
|Summary:||The remote host is missing an update for the 'mercurial'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'mercurial'
package(s) announced via the referenced advisory.
Mercurial is a fast, lightweight source
control management system designed for efficient handling of very large
distributed projects. Security Fix(es): * A vulnerability was found in the way
Mercurial handles path auditing and caches the results. An attacker could abuse
a repository with a series of commits mixing symlinks and regular
files/directories to trick Mercurial into writing outside of a given repository.
(CVE-2017-1000115) * A shell command injection flaw related to the handling of
'ssh' URLs has been discovered in Mercurial. This can be exploited to execute
shell commands with the privileges of the user running the Mercurial client, for
example, when performing a 'checkout' or 'update' action on a sub-repository
within a malicious repository or a legitimate repository containing a malicious
commit. (CVE-2017-1000116) Red Hat would like to thank the Mercurial Security
Team for reporting CVE-2017-1000115 and the Subversion Team for reporting
on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000115|
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000116
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.