SB2017092404 - Gentoo update for Mercurial
Published: September 24, 2017 Updated: September 24, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2017-1000115)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository
2) OS Command Injection (CVE-ID: CVE-2017-1000116)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.
3) Remote code execution (CVE-ID: CVE-2017-9462)
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.The weakness exists due to improper input validation in "hg serve --stdio". A remote attacker can use --debugger as a repository name and consequently execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.