Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zdjYyLXd3OHctNzU4bc4AAQWh

Mercurial Improper Input Validation vulnerability

The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001.

Permalink: https://github.com/advisories/GHSA-3v62-ww8w-758m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zdjYyLXd3OHctNzU4bc4AAQWh
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 17 days ago


CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-3v62-ww8w-758m, CVE-2018-13348
References: Blast Radius: 24.4

Affected Packages

pypi:mercurial
Dependent packages: 15
Dependent repositories: 1,767
Downloads: 62,755 last month
Affected Version Ranges: < 4.6.1
Fixed in: 4.6.1
All affected versions: 0.8.1, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 1.0.1, 1.0.2, 1.1.1, 1.1.2, 1.2.1, 1.3.1, 1.4.1, 1.4.2, 1.4.3, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.7.1, 1.7.2, 1.7.3, 1.7.5, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.9.1, 1.9.2, 1.9.3, 2.0.1, 2.0.2, 2.1.1, 2.1.2, 2.2.2, 2.4.1, 2.5.1, 2.5.2, 2.6.1, 2.6.2, 2.6.3, 2.7.0, 2.7.1, 2.7.2, 2.8.1, 2.8.2, 2.9.1, 3.0.1, 3.1.1, 3.1.2, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.3.1, 3.3.2, 3.3.3, 3.4.1, 3.4.2, 3.5.1, 3.5.2, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.7.3, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.9.1, 3.9.2, 4.0.1, 4.0.2, 4.1.1, 4.1.2, 4.1.3, 4.2.1, 4.2.2, 4.2.3, 4.3.1, 4.3.2, 4.3.3, 4.4.1, 4.4.2, 4.5.1, 4.5.2, 4.5.3
All unaffected versions: 4.6.1, 4.6.2, 4.7.1, 4.7.2, 4.8.1, 4.8.2, 4.9.1, 5.0.1, 5.0.2, 5.1.1, 5.1.2, 5.2.1, 5.2.2, 5.3.1, 5.3.2, 5.4.1, 5.4.2, 5.5.1, 5.5.2, 5.6.1, 5.7.1, 5.8.1, 5.9.1, 5.9.2, 5.9.3, 6.0.1, 6.0.2, 6.0.3, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.2, 6.2.3, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.5.1, 6.5.2, 6.5.3, 6.6.1, 6.6.2, 6.6.3, 6.7.1, 6.7.2, 6.7.3