Amazon Linux 1 Security Advisory: ALAS-2017-893
Advisory Release Date: 2017-09-13 22:52 Pacific
Advisory Updated Date: 2017-09-14 22:21 Pacific
A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub-repository within a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000116)
A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. (CVE-2017-1000115)
Affected Packages:
mercurial
Issue Correction:
Run yum update mercurial to update your system.
i686:
mercurial-common-4.2.3-1.29.amzn1.i686
emacs-mercurial-4.2.3-1.29.amzn1.i686
mercurial-python26-4.2.3-1.29.amzn1.i686
mercurial-debuginfo-4.2.3-1.29.amzn1.i686
mercurial-python27-4.2.3-1.29.amzn1.i686
emacs-mercurial-el-4.2.3-1.29.amzn1.i686
src:
mercurial-4.2.3-1.29.amzn1.src
x86_64:
mercurial-python27-4.2.3-1.29.amzn1.x86_64
emacs-mercurial-4.2.3-1.29.amzn1.x86_64
mercurial-debuginfo-4.2.3-1.29.amzn1.x86_64
mercurial-common-4.2.3-1.29.amzn1.x86_64
mercurial-python26-4.2.3-1.29.amzn1.x86_64
emacs-mercurial-el-4.2.3-1.29.amzn1.x86_64