Ubuntu Security Notice USN-3388-1
11th August, 2017
subversion vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Subversion.
Software description
- subversion - Advanced version control system
Details
Joern Schneeweisz discovered that Subversion did not properly handle
host names in 'svn+ssh://' URLs. A remote attacker could use this
to construct a subversion repository that when accessed could run
arbitrary code with the privileges of the user. (CVE-2017-9800)
Daniel Shahaf and James McCoy discovered that Subversion did not
properly verify realms when using Cyrus SASL authentication. A
remote attacker could use this to possibly bypass intended access
restrictions. This issue only affected Ubuntu 14.04 LTS and Ubuntu
16.04 LTS. (CVE-2016-2167)
Florian Weimer discovered that Subversion clients did not properly
restrict XML entity expansion when accessing http(s):// URLs. A remote
attacker could use this to cause a denial of service. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-8734)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 17.04:
- subversion 1.9.5-1ubuntu1.1
- libsvn1 1.9.5-1ubuntu1.1
- Ubuntu 16.04 LTS:
- subversion 1.9.3-2ubuntu1.1
- libapache2-svn 1.9.3-2ubuntu1.1
- libapache2-mod-svn 1.9.3-2ubuntu1.1
- libsvn1 1.9.3-2ubuntu1.1
- Ubuntu 14.04 LTS:
- subversion 1.8.8-1ubuntu3.3
- libapache2-svn 1.8.8-1ubuntu3.3
- libapache2-mod-svn 1.8.8-1ubuntu3.3
- libsvn1 1.8.8-1ubuntu3.3
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
In general, a standard system update will make all the necessary changes.
References
CVE-2016-2167, CVE-2016-8734, CVE-2017-9800
from Ubuntu Security Notices http://ift.tt/2vpe3Gw
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.