Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Mercurial
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Mercurial
ID: DSA-3257-1
Distribution: Debian
Plattformen: Debian sid, Debian wheezy, Debian jessie
Datum: Di, 12. Mai 2015, 01:09
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9462
Applikationen: Mercurial

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3257-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
May 11, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mercurial
CVE ID : CVE-2014-9462
Debian Bug : 783237

Jesse Hertz of Matasano Security discovered that Mercurial, a
distributed version control system, is prone to a command injection
vulnerability via a crafted repository name in a clone command.

For the oldstable distribution (wheezy), this problem has been fixed in
version 2.2.2-4+deb7u1. This update also includes a fix for
CVE-2014-9390 previously scheduled for the next wheezy point release.

For the stable distribution (jessie), this problem has been fixed in
version 3.1.2-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 3.4-1.

We recommend that you upgrade your mercurial packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=jXXY
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Archive: https://lists.debian.org/E1Yrtx7-0008CK-FY@master.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung