Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/mercurial@6.3.2-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/mercurial@6.3.2-1%2Bdeb12u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (20)
Vulnerability Summary Aliases
VCID-1kmd-1kun-qbdd The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004. CVE-2018-13346
GHSA-9xv4-r2hf-26gh
PYSEC-2018-88
VCID-1yyr-7yb1-2ue6 mercurial: missing allowpull permission check in hgweb CVE-2008-4297
VCID-4e9f-mexc-jfgm Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Directory traversal vulnerability in patch.py in Mercurial 1.0.1 allows user-assisted attackers to modify arbitrary files via ".." (dot dot) sequences in a patch file. CVE-2008-2942
GHSA-v2gw-x5jf-pgwv
VCID-5e12-c4fx-rfa3 The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name. CVE-2016-3105
GHSA-49cw-434h-qc57
PYSEC-2016-28
VCID-673d-uck5-tbb7 Mercurial Improper Certificate Validation vulnerability Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack. CVE-2010-4237
GHSA-7gf7-7wx4-mxmw
VCID-6jye-8j2x-2bgp The binary delta decoder in Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a (1) clone, (2) push, or (3) pull command, related to (a) a list sizing rounding error and (b) short records. CVE-2016-3630
GHSA-9vjf-jjcq-3gh7
PYSEC-2016-29
VCID-7vwz-hbq8-c7dr In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name. CVE-2017-9462
GHSA-ghjx-3jg5-h6r2
PYSEC-2017-91
VCID-bahp-n5dx-2qeg Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1. CVE-2018-1000132
GHSA-4mr4-7vjv-9hm6
PYSEC-2018-87
VCID-ck6k-4bcg-6faq Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks. CVE-2017-1000116
GHSA-3qmg-c9vc-r47j
PYSEC-2017-89
VCID-d2sb-fpzt-3fbm A vulnerability was found in Mercurial SCM 4.5.3/71.19.145.211. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument cmd leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. CVE-2025-2361
VCID-hhwu-knps-qqfw mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-20180430-0002. CVE-2018-13347
GHSA-3mjj-mr4f-qxmx
PYSEC-2018-89
VCID-j1c4-rux6-wygr Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. CVE-2014-9390
GHSA-6vvc-c2m3-cjf3
PYSEC-2020-217
VCID-nruh-my9y-jqfj In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically. CVE-2017-17458
GHSA-6v56-cpg6-3rpx
PYSEC-2017-90
VCID-qs77-k84k-qfam Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository. CVE-2016-3068
GHSA-j7c2-rqm3-c97m
PYSEC-2016-26
VCID-t9gd-va4q-a3ga cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry. CVE-2018-17983
GHSA-p575-cf9h-wv42
PYSEC-2018-91
VCID-tks6-8etr-mkf1 The _validaterepo function in sshpeer in Mercurial before 3.2.4 allows remote attackers to execute arbitrary commands via a crafted repository name in a clone command. CVE-2014-9462
GHSA-3pmw-h7j4-rf54
PYSEC-2015-14
VCID-v91s-ety2-x7au The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001. CVE-2018-13348
GHSA-3v62-ww8w-758m
PYSEC-2018-90
VCID-z346-9s62-afaz A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial's path-checking logic and write files outside a repository. CVE-2019-3902
GHSA-mq66-vcfc-8246
PYSEC-2019-188
VCID-z59g-jz53-cudb Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository CVE-2017-1000115
GHSA-hvr9-wr9p-grgr
PYSEC-2017-88
VCID-znz1-y81d-zfff Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository. CVE-2016-3069
GHSA-8fm8-7365-5rh2
PYSEC-2016-27

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:42:36.984635+00:00 Debian Importer Fixing VCID-6jye-8j2x-2bgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:48.725130+00:00 Debian Importer Fixing VCID-v91s-ety2-x7au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:36.154722+00:00 Debian Importer Fixing VCID-673d-uck5-tbb7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:22:09.516234+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:42.561311+00:00 Debian Importer Fixing VCID-t9gd-va4q-a3ga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:43.331183+00:00 Debian Importer Fixing VCID-qs77-k84k-qfam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:56.811744+00:00 Debian Importer Fixing VCID-z59g-jz53-cudb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:26.116217+00:00 Debian Importer Fixing VCID-hhwu-knps-qqfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:11.773811+00:00 Debian Importer Fixing VCID-znz1-y81d-zfff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:52.103717+00:00 Debian Importer Fixing VCID-ck6k-4bcg-6faq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:38:17.687036+00:00 Debian Importer Fixing VCID-tks6-8etr-mkf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:42.511224+00:00 Debian Importer Fixing VCID-d2sb-fpzt-3fbm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:07:28.576556+00:00 Debian Importer Fixing VCID-7vwz-hbq8-c7dr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:41.094538+00:00 Debian Importer Fixing VCID-5e12-c4fx-rfa3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:40.674018+00:00 Debian Importer Fixing VCID-bahp-n5dx-2qeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:47.452882+00:00 Debian Importer Fixing VCID-1yyr-7yb1-2ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:13.334078+00:00 Debian Importer Fixing VCID-z346-9s62-afaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:54.260874+00:00 Debian Importer Fixing VCID-1kmd-1kun-qbdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:40:02.342474+00:00 Debian Importer Fixing VCID-nruh-my9y-jqfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:09.839555+00:00 Debian Importer Fixing VCID-4e9f-mexc-jfgm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:47.207914+00:00 Debian Importer Fixing VCID-bahp-n5dx-2qeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:56:56.698894+00:00 Debian Importer Fixing VCID-5e12-c4fx-rfa3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:54.030071+00:00 Debian Importer Fixing VCID-v91s-ety2-x7au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:49.940238+00:00 Debian Importer Fixing VCID-ck6k-4bcg-6faq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:49.312596+00:00 Debian Importer Fixing VCID-6jye-8j2x-2bgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:50.521070+00:00 Debian Importer Fixing VCID-znz1-y81d-zfff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:39.217240+00:00 Debian Importer Fixing VCID-673d-uck5-tbb7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:15.972695+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:45.112780+00:00 Debian Importer Fixing VCID-7vwz-hbq8-c7dr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:40.580563+00:00 Debian Importer Fixing VCID-t9gd-va4q-a3ga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:12.394981+00:00 Debian Importer Fixing VCID-qs77-k84k-qfam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:41.241405+00:00 Debian Importer Fixing VCID-z59g-jz53-cudb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:57.734583+00:00 Debian Importer Fixing VCID-hhwu-knps-qqfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:52.805658+00:00 Debian Importer Fixing VCID-tks6-8etr-mkf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:48.765588+00:00 Debian Importer Fixing VCID-d2sb-fpzt-3fbm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:57.938903+00:00 Debian Importer Fixing VCID-1yyr-7yb1-2ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:30.018759+00:00 Debian Importer Fixing VCID-z346-9s62-afaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:12.922381+00:00 Debian Importer Fixing VCID-1kmd-1kun-qbdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:34.245976+00:00 Debian Importer Fixing VCID-nruh-my9y-jqfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:01.500639+00:00 Debian Importer Fixing VCID-4e9f-mexc-jfgm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:45:57.094482+00:00 Debian Importer Fixing VCID-d2sb-fpzt-3fbm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:57.035860+00:00 Debian Importer Fixing VCID-z346-9s62-afaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.983786+00:00 Debian Importer Fixing VCID-t9gd-va4q-a3ga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.929309+00:00 Debian Importer Fixing VCID-v91s-ety2-x7au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.873339+00:00 Debian Importer Fixing VCID-hhwu-knps-qqfw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.816675+00:00 Debian Importer Fixing VCID-1kmd-1kun-qbdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.751242+00:00 Debian Importer Fixing VCID-bahp-n5dx-2qeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.694481+00:00 Debian Importer Fixing VCID-7vwz-hbq8-c7dr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.642921+00:00 Debian Importer Fixing VCID-nruh-my9y-jqfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.588417+00:00 Debian Importer Fixing VCID-ck6k-4bcg-6faq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.530436+00:00 Debian Importer Fixing VCID-z59g-jz53-cudb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.473215+00:00 Debian Importer Fixing VCID-6jye-8j2x-2bgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.423264+00:00 Debian Importer Fixing VCID-5e12-c4fx-rfa3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.369768+00:00 Debian Importer Fixing VCID-znz1-y81d-zfff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.312904+00:00 Debian Importer Fixing VCID-qs77-k84k-qfam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.254670+00:00 Debian Importer Fixing VCID-tks6-8etr-mkf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.195294+00:00 Debian Importer Fixing VCID-j1c4-rux6-wygr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.137600+00:00 Debian Importer Fixing VCID-673d-uck5-tbb7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.081396+00:00 Debian Importer Fixing VCID-1yyr-7yb1-2ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:56.019203+00:00 Debian Importer Fixing VCID-4e9f-mexc-jfgm https://security-tracker.debian.org/tracker/data/json 38.1.0