First published: Wed Apr 13 2016(Updated: )
The binary delta decoder in Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a (1) clone, (2) push, or (3) pull command, related to (a) a list sizing rounding error and (b) short records.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mercurial | <3.7.3 | 3.7.3 |
Fedora | =22 | |
Fedora | =23 | |
SUSE openSUSE | =42.1 | |
Mercurial | <=3.7.2 | |
Debian | =7.0 | |
Debian | =8.0 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
openSUSE libeconf | =13.2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3630 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2016-3630, upgrade Mercurial to version 3.7.3 or later.
Mercurial versions prior to 3.7.3 are affected by CVE-2016-3630.
Yes, CVE-2016-3630 can be exploited remotely through clone, push, or pull commands.
CVE-2016-3630 is associated with arbitrary code execution due to list sizing rounding errors and issues with short records.