CentOS Errata and Security Advisory CESA-2017:2489
Mercurial is a fast, lightweight source control management system designed for efficient handling of very large distributed projects.
A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. (CVE-2017-1000115)
A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub-repository within a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000116)
Red Hat would like to thank the Mercurial Security Team for reporting CVE-2017-1000115 and the Subversion Team for reporting CVE-2017-1000116.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-cr-announce/2017-August/004690.html
Affected packages: emacs-mercurial emacs-mercurial-el mercurial mercurial-hgk
Upstream details at: