First published: Wed Apr 13 2016(Updated: )
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mercurial | <3.7.3 | 3.7.3 |
Mercurial | <=3.7.2 | |
Debian | =7.0 | |
Debian | =8.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
Open edX | =13.2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
SUSE openSUSE | =42.1 | |
Fedora | =22 | |
Fedora | =23 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3069 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2016-3069, upgrade Mercurial to version 3.7.3 or later.
CVE-2016-3069 allows attackers to execute arbitrary code, posing a significant risk to the integrity and security of affected systems.
Mercurial versions prior to 3.7.3 are affected by CVE-2016-3069.
Yes, CVE-2016-3069 can be exploited by remote attackers through a crafted name when converting a Git repository.