USN-3388-2: Subversion vulnerabilities
24 October 2017
Several security issues were fixed in Subversion.
Releases
Packages
- subversion - Advanced version control system
Details
USN-3388-1 fixed several vulnerabilities in Subversion. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Ivan Zhakov discovered that Subversion did not properly handle
some requests. A remote attacker could use this to cause a
denial of service. (CVE-2016-2168)
Original advisory details:
Joern Schneeweisz discovered that Subversion did not properly handle
host names in 'svn+ssh://' URLs. A remote attacker could use this
to construct a subversion repository that when accessed could run
arbitrary code with the privileges of the user. (CVE-2017-9800)
Daniel Shahaf and James McCoy discovered that Subversion did not
properly verify realms when using Cyrus SASL authentication. A
remote attacker could use this to possibly bypass intended access
restrictions. (CVE-2016-2167)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
-
subversion
-
1.6.17dfsg-3ubuntu3.7
-
libapache2-svn
-
1.6.17dfsg-3ubuntu3.7
-
libsvn1
-
1.6.17dfsg-3ubuntu3.7
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3388-1: ruby-svn, libapache2-svn, libsvn-ruby1.8, libsvn-doc, libsvn1, subversion, subversion-tools, python-subversion, libapache2-mod-svn, libsvn-java, libsvn-dev, libsvn-perl