-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3542-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 05, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mercurial CVE ID : CVE-2016-3068 CVE-2016-3069 CVE-2016-3630 Debian Bug : 819504 Several vulnerabilities have been discovered in Mercurial, a distributed version control system. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2016-3068 Blake Burkhart discovered that Mercurial allows URLs for Git subrepositories that could result in arbitrary code execution on clone. CVE-2016-3069 Blake Burkhart discovered that Mercurial allows arbitrary code execution when converting Git repositories with specially crafted names. CVE-2016-3630 It was discovered that Mercurial does not properly perform bounds- checking in its binary delta decoder, which may be exploitable for remote code execution via clone, push or pull. For the oldstable distribution (wheezy), these problems have been fixed in version 2.2.2-4+deb7u2. For the stable distribution (jessie), these problems have been fixed in version 3.1.2-2+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 3.7.3-1. We recommend that you upgrade your mercurial packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXA8Y/AAoJEAVMuPMTQ89EkvUP+wTR1EZ80U9mQrHz9rc/RorN j99RjQIDrV49nNTPXbp0vfXKxg3JE/n/hZBAzpwakuFUW4lr58FFosnDAXE7SbZR d4h8hASf7AJMY+7c/KO7PdPyTvS+16NgRSaBh1qCdUjee6COsi1nuui3B53AK2AK SjjH5sDMRToXCd0yERr91DkJxx7NEeAXskUIfdozsGOAWu7DQKFjX5myUSWanTne QPOYES8697tIpC6wuopByhGxdmq+nd/bJLGOAY1cvIisb0AHtq8EEA5ANJdgkTOX PnG/xbDF6nfbpqUx7l5PbYFkxa9cr5SfQTL0oAKFM2girF88isMiv6kzJLkqkS6L wjvEdWXbnUMoJ3YS2zzWsj+U8co6DUmBOGlx9TJqFKgr4PNh17d2V/PKTYlK1/Ra BlIuvrThSOGp5mcx5Qk3XU/2JRpg9WCCDFfNwjW15rE1Ze3LEgXcFFR4lB4cK9cG 2O07LiY6VL6Ts0ZeuaWKCMBpMnTHN5Cu9sQk3BY5IYV498Mqqgo3tUUVpo8il+02 jhY2qQ1fZxaTa+b89hB2Xbs1/8rJq1mVcDwzPMPdiMYP1jvCWLypcdGmLNzAnXZy OhmP15d1f0L4cT9QscupZ2u1atSUluJ0pt8cGXRJFkcbwKDYyqu0Df3KoznQmg78 L1UbtJLqifIVtaYDipu0 =nQX0 -----END PGP SIGNATURE-----