lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 29 Apr 2016 13:04:16 +0000 From: Salvatore Bonaccorso <carnil@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 3561-1] subversion security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3561-1 security@...ian.org https://www.debian.org/security/ Salvatore Bonaccorso April 29, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : subversion CVE ID : CVE-2016-2167 CVE-2016-2168 Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-2167 Daniel Shahaf and James McCoy discovered that an implementation error in the authentication against the Cyrus SASL library would permit a remote user to specify a realm string which is a prefix of the expected realm string and potentially allowing a user to authenticate using the wrong realm. CVE-2016-2168 Ivan Zhakov of VisualSVN discovered a remotely triggerable denial of service vulnerability in the mod_authz_svn module during COPY or MOVE authorization check. An authenticated remote attacker could take advantage of this flaw to cause a denial of service (Subversion server crash) via COPY or MOVE requests with specially crafted header. For the stable distribution (jessie), these problems have been fixed in version 1.8.10-6+deb8u4. For the unstable distribution (sid), these problems have been fixed in version 1.9.4-1. We recommend that you upgrade your subversion packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXI1joAAoJEAVMuPMTQ89EPZsP/36yJUo4JEoii7cuoc9XLhSJ Hj7ILFDSWkH7cUdUBVpCirvL+LwE2koIESE+K9xFiI2RpLIBZBnRDnSu9R7r+P8b mVrGkMLaAWXdcwnZAcrcYggV/yetyGEleLMeUBqAxZ5UZwoiog5X9OON7nBNAeMS +vUWv0bodjyljTR7u144yGTQv++WtFLnkdZPx4Ij68AGwBoSDwNyViPb/sFFzpkE 2UJl25GWtAcOsj9KKd9i5ADY2EKu7TxCzCQHvPflYSwNrD6ZlMAgoszYUMJRWt+I XnC5SMGOkZKmT15OME+cZQcCtJaerApUxDSnyXy20pbsSW4cbLIW+kIZwZiFMUyQ m+90HM9XNlmpr5J4+++iN7Y5zI01XkuQy7iQXRGDXkZO76v5tiJZS4/uEsGAATzM jqUqs98vHU3FYkz0kyzZCrY1RmZNnbEtnXYafBQSdQhHM04bRllxhr35AA6LMOgE TGijgyfQS9zLhP6ZbCW7VO1tOMjgdEgSy79XT+4iDZc5SsGSXVr1O14Ku3J2+TwX OyokO7Y/7IebJedIVq8vLGwtUNe0t8PmvjETkQNRrdbGmpnyTCeitStMdi6SMZWR fn4JQxsaSnbMha7+Kx46JShC5Bh6sHRhEnnV2cZO5r5NjI/QZxdRzxwZnbc4TJpO BjTzPa9IX4a8MVBC0OA7 =z2mM -----END PGP SIGNATURE-----
Powered by blists - more mailing lists