The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201612-19 | vendor advisory |
http://www.securityfocus.com/bid/90536 | vdb entry |
https://selenic.com/hg/rev/a56296f55a5e | |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00082.html | vendor advisory |
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255 | vendor advisory |
https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.8_.2F_3.8.1_.282016-5-1.29 | vendor advisory |
http://www.debian.org/security/2016/dsa-3570 | vendor advisory |