ALAS-2017-893


Amazon Linux AMI Security Advisory: ALAS-2017-893
Advisory Release Date: 2017-09-14 22:21 Pacific
Severity: Important

Issue Overview:

A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub-repository within a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000116 )

A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. (CVE-2017-1000115 )


Affected Packages:

mercurial


Issue Correction:
Run yum update mercurial to update your system.

New Packages:
i686:
    mercurial-common-4.2.3-1.29.amzn1.i686
    emacs-mercurial-4.2.3-1.29.amzn1.i686
    mercurial-python26-4.2.3-1.29.amzn1.i686
    mercurial-debuginfo-4.2.3-1.29.amzn1.i686
    mercurial-python27-4.2.3-1.29.amzn1.i686
    emacs-mercurial-el-4.2.3-1.29.amzn1.i686

src:
    mercurial-4.2.3-1.29.amzn1.src

x86_64:
    mercurial-python27-4.2.3-1.29.amzn1.x86_64
    emacs-mercurial-4.2.3-1.29.amzn1.x86_64
    mercurial-debuginfo-4.2.3-1.29.amzn1.x86_64
    mercurial-common-4.2.3-1.29.amzn1.x86_64
    mercurial-python26-4.2.3-1.29.amzn1.x86_64
    emacs-mercurial-el-4.2.3-1.29.amzn1.x86_64