First published: Tue Aug 06 2019(Updated: )
It was discovered that Mercurial mishandled symlinks in subrepositories. An attacker could use this vulnerability to write arbitrary files to the target's filesystem.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/mercurial | <4.8.2-1ubuntu3.19.04.1 | 4.8.2-1ubuntu3.19.04.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/mercurial-common | <4.8.2-1ubuntu3.19.04.1 | 4.8.2-1ubuntu3.19.04.1 |
Ubuntu OpenSSH Client | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4086-1 is critical due to its ability to allow an attacker to write arbitrary files to the target's filesystem.
To fix USN-4086-1, upgrade to the patched version of Mercurial, specifically 4.8.2-1ubuntu3.19.04.1.
USN-4086-1 affects Mercurial and mercurial-common versions prior to 4.8.2-1ubuntu3.19.04.1 on Ubuntu 19.04.
Yes, USN-4086-1 can potentially be exploited remotely if an attacker manipulates symlinks in subrepositories.
Failing to address USN-4086-1 may lead to unauthorized file manipulation on your system, posing significant security risks.