First published: Wed Apr 13 2016(Updated: )
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mercurial | <3.7.3 | 3.7.3 |
Debian | =7.0 | |
Debian | =8.0 | |
Mercurial | <=3.7.2 | |
Fedora | =22 | |
Fedora | =23 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
Open edX | =13.2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
SUSE openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3068 is classified as a critical vulnerability due to the potential for remote arbitrary code execution.
To fix CVE-2016-3068, upgrade Mercurial to version 3.7.3 or later without delay.
CVE-2016-3068 affects Mercurial versions prior to 3.7.3.
Yes, CVE-2016-3068 can be exploited remotely when an attacker uses a crafted git ext:: URL.
CVE-2016-3068 impacts multiple systems including Debian, Fedora, Red Hat, and SUSE distributions that use vulnerable versions of Mercurial.