<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">mercurial-5.9.1-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10586</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">mercurial-5.9.1-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the mercurial-5.9.1-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10586</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2942/</URL>
      <Description>SUSE CVE CVE-2008-2942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000115/</URL>
      <Description>SUSE CVE CVE-2017-1000115 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000116/</URL>
      <Description>SUSE CVE CVE-2017-1000116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17458/</URL>
      <Description>SUSE CVE CVE-2017-17458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000132/</URL>
      <Description>SUSE CVE CVE-2018-1000132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13346/</URL>
      <Description>SUSE CVE CVE-2018-13346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13348/</URL>
      <Description>SUSE CVE CVE-2018-13348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17983/</URL>
      <Description>SUSE CVE CVE-2018-17983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3902/</URL>
      <Description>SUSE CVE CVE-2019-3902 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="mercurial-5.9.1-2.1">
      <FullProductName ProductID="mercurial-5.9.1-2.1">mercurial-5.9.1-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mercurial-lang-5.9.1-2.1">
      <FullProductName ProductID="mercurial-lang-5.9.1-2.1">mercurial-lang-5.9.1-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mercurial-tests-5.9.1-2.1">
      <FullProductName ProductID="mercurial-tests-5.9.1-2.1">mercurial-tests-5.9.1-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="mercurial-5.9.1-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mercurial-5.9.1-2.1">mercurial-5.9.1-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mercurial-lang-5.9.1-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1">mercurial-lang-5.9.1-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mercurial-tests-5.9.1-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1">mercurial-tests-5.9.1-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in patch.py in Mercurial 1.0.1 allows user-assisted attackers to modify arbitrary files via ".." (dot dot) sequences in a patch file.</Note>
    </Notes>
    <CVE>CVE-2008-2942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2942.html</URL>
        <Description>CVE-2008-2942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/404959</URL>
        <Description>SUSE Bug 404959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository</Note>
    </Notes>
    <CVE>CVE-2017-1000115</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000115.html</URL>
        <Description>CVE-2017-1000115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053344</URL>
        <Description>SUSE Bug 1053344</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.</Note>
    </Notes>
    <CVE>CVE-2017-1000116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000116.html</URL>
        <Description>CVE-2017-1000116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052481</URL>
        <Description>SUSE Bug 1052481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052696</URL>
        <Description>SUSE Bug 1052696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052932</URL>
        <Description>SUSE Bug 1052932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053364</URL>
        <Description>SUSE Bug 1053364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054653</URL>
        <Description>SUSE Bug 1054653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066430</URL>
        <Description>SUSE Bug 1066430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071709</URL>
        <Description>SUSE Bug 1071709</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically.</Note>
    </Notes>
    <CVE>CVE-2017-17458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17458.html</URL>
        <Description>CVE-2017-17458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071715</URL>
        <Description>SUSE Bug 1071715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.</Note>
    </Notes>
    <CVE>CVE-2018-1000132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000132.html</URL>
        <Description>CVE-2018-1000132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085211</URL>
        <Description>SUSE Bug 1085211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004.</Note>
    </Notes>
    <CVE>CVE-2018-13346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13346.html</URL>
        <Description>CVE-2018-13346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100354</URL>
        <Description>SUSE Bug 1100354</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001.</Note>
    </Notes>
    <CVE>CVE-2018-13348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13348.html</URL>
        <Description>CVE-2018-13348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100353</URL>
        <Description>SUSE Bug 1100353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry.</Note>
    </Notes>
    <CVE>CVE-2018-17983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17983.html</URL>
        <Description>CVE-2018-17983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110899</URL>
        <Description>SUSE Bug 1110899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository.</Note>
    </Notes>
    <CVE>CVE-2019-3902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:mercurial-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-lang-5.9.1-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mercurial-tests-5.9.1-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3902.html</URL>
        <Description>CVE-2019-3902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133035</URL>
        <Description>SUSE Bug 1133035</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
