{"id":"CVE-2016-3068","details":"Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.","aliases":["GHSA-j7c2-rqm3-c97m","PYSEC-2016-26"],"modified":"2026-04-16T01:38:08.995268822Z","published":"2016-04-13T16:59:16.177Z","related":["SUSE-SU-2016:1010-1","SUSE-SU-2016:1011-1","openSUSE-SU-2024:10070-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/85733"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0706.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3542"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-19"},{"type":"ADVISORY","url":"https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.7.3_.282016-3-29.29"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181505.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181542.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00016.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00018.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00043.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00017.html"},{"type":"FIX","url":"https://selenic.com/repo/hg-stable/rev/34d43cb85de8"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3068.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"22"}]},{"events":[{"introduced":"0"},{"last_affected":"23"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"12-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}