Twenty Year Anniversary

Red Hat Security Advisory 2017-2489-01

Red Hat Security Advisory 2017-2489-01
Posted Aug 17, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2489-01 - Mercurial is a fast, lightweight source control management system designed for efficient handling of very large distributed projects. Security Fix: A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub-repository within a malicious repository or a legitimate repository containing a malicious commit.

tags | advisory, shell
systems | linux, redhat
advisories | CVE-2017-1000115, CVE-2017-1000116
MD5 | d8aca43735ba972fb53be71326d4f3c6

Red Hat Security Advisory 2017-2489-01

Change Mirror Download
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 17 Aug 2017 11:08:21 +0000 (UTC)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: mercurial security update
Advisory ID: RHSA-2017:2489-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2489
Issue date: 2017-08-17
CVE Names: CVE-2017-1000115 CVE-2017-1000116
=====================================================================

1. Summary:

An update for mercurial is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

Mercurial is a fast, lightweight source control management system designed
for efficient handling of very large distributed projects.

Security Fix(es):

* A vulnerability was found in the way Mercurial handles path auditing and
caches the results. An attacker could abuse a repository with a series of
commits mixing symlinks and regular files/directories to trick Mercurial
into writing outside of a given repository. (CVE-2017-1000115)

* A shell command injection flaw related to the handling of "ssh" URLs has
been discovered in Mercurial. This can be exploited to execute shell
commands with the privileges of the user running the Mercurial client, for
example, when performing a "checkout" or "update" action on a
sub-repository within a malicious repository or a legitimate repository
containing a malicious commit. (CVE-2017-1000116)

Red Hat would like to thank the Mercurial Security Team for reporting
CVE-2017-1000115 and the Subversion Team for reporting CVE-2017-1000116.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1479915 - CVE-2017-1000116 mercurial: command injection on clients through malicious ssh URLs
1480330 - CVE-2017-1000115 Mercurial: pathaudit: path traversal via symlink

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
mercurial-2.6.2-8.el7_4.src.rpm

x86_64:
emacs-mercurial-2.6.2-8.el7_4.x86_64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm
mercurial-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm
mercurial-hgk-2.6.2-8.el7_4.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
mercurial-2.6.2-8.el7_4.src.rpm

x86_64:
emacs-mercurial-2.6.2-8.el7_4.x86_64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm
mercurial-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm
mercurial-hgk-2.6.2-8.el7_4.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
mercurial-2.6.2-8.el7_4.src.rpm

aarch64:
mercurial-2.6.2-8.el7_4.aarch64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.aarch64.rpm

ppc64:
mercurial-2.6.2-8.el7_4.ppc64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.ppc64.rpm

ppc64le:
mercurial-2.6.2-8.el7_4.ppc64le.rpm
mercurial-debuginfo-2.6.2-8.el7_4.ppc64le.rpm

s390x:
mercurial-2.6.2-8.el7_4.s390x.rpm
mercurial-debuginfo-2.6.2-8.el7_4.s390x.rpm

x86_64:
mercurial-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

aarch64:
emacs-mercurial-2.6.2-8.el7_4.aarch64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.aarch64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.aarch64.rpm
mercurial-hgk-2.6.2-8.el7_4.aarch64.rpm

ppc64:
emacs-mercurial-2.6.2-8.el7_4.ppc64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.ppc64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.ppc64.rpm
mercurial-hgk-2.6.2-8.el7_4.ppc64.rpm

ppc64le:
emacs-mercurial-2.6.2-8.el7_4.ppc64le.rpm
emacs-mercurial-el-2.6.2-8.el7_4.ppc64le.rpm
mercurial-debuginfo-2.6.2-8.el7_4.ppc64le.rpm
mercurial-hgk-2.6.2-8.el7_4.ppc64le.rpm

s390x:
emacs-mercurial-2.6.2-8.el7_4.s390x.rpm
emacs-mercurial-el-2.6.2-8.el7_4.s390x.rpm
mercurial-debuginfo-2.6.2-8.el7_4.s390x.rpm
mercurial-hgk-2.6.2-8.el7_4.s390x.rpm

x86_64:
emacs-mercurial-2.6.2-8.el7_4.x86_64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm
mercurial-hgk-2.6.2-8.el7_4.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
mercurial-2.6.2-8.el7_4.src.rpm

x86_64:
mercurial-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
emacs-mercurial-2.6.2-8.el7_4.x86_64.rpm
emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm
mercurial-debuginfo-2.6.2-8.el7_4.x86_64.rpm
mercurial-hgk-2.6.2-8.el7_4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-1000115
https://access.redhat.com/security/cve/CVE-2017-1000116
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZlXnjXlSAg2UNWIIRApcuAKCgY6cGCsoExZKsCiI3d5rzemskjQCfTsp8
5GtojZXNp+isCw/HeXD/u4E=
=UOvG
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    21 Files
  • 17
    Jul 17th
    10 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close