Bug 1332945 (CVE-2016-3105)

Summary: CVE-2016-3105 mercurial: arbitrary code execution when converting git repos
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: mads, ndbecker2, pstodulk
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: mercurial 3.8 Doc Type: Bug Fix
Doc Text:
It was discovered that the Mercurial convert extension invoked Git in a way that could cause Git to interpret local repository name as remote repository URL. A Git repository with a specially crafted name could cause Mercurial to execute arbitrary code when the Git repository was converted to a Mercurial repository.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:51:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1332946    
Bug Blocks: 1332947    

Description Andrej Nemec 2016-05-04 12:08:37 UTC
A possible arbitrary code execution when converting Git repos was found in Mercirual.  Mercurial prior to 3.8 allowed arbitrary code execution when using the convert extension on Git repos with hostile names. This could affect automated code conversion services that allow arbitrary repository names. This is a further side-effect of Git CVE-2015-7545.

External Reference:


Upstream fix:


Comment 1 Andrej Nemec 2016-05-04 12:09:01 UTC
Created mercurial tracking bugs for this issue:

Affects: fedora-all [bug 1332946]