First published: Wed Apr 13 2016(Updated: )
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mercurial | <3.7.3 | 3.7.3 |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Mercurial Mercurial | <=3.7.2 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Hpc Node | =7.0 | |
Redhat Enterprise Linux Hpc Node Eus | =7.2 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Workstation | =7.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
openSUSE openSUSE | =13.2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.