Mehrere Probleme in Subversion (Aktualisierung)
ID: | USN-3388-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Di, 24. Oktober 2017, 22:13 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168 |
Applikationen: | Subversion |
Update von: | Mehrere Probleme in Subversion |
Originalnachricht |
|
--===============5443123873873936110== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-NuhW+JRLITtJ1V3Ayjn6" --=-NuhW+JRLITtJ1V3Ayjn6 Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3388-2 October 24, 2017 subversion vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were fixed in Subversion. Software Description: - subversion: Advanced version control system Details: USN-3388-1 fixed several vulnerabilities in Subversion. This update provides the corresponding update for Ubuntu 12.04 ESM. Ivan Zhakov discovered that Subversion did not properly handle some requests. A remote attacker could use this to cause a denial of service. (CVE-2016-2168) Original advisory details:  Joern Schneeweisz discovered that Subversion did not properly handle  host names in 'svn+ssh://' URLs. A remote attacker could use this  to construct a subversion repository that when accessed could run  arbitrary code with the privileges of the user. (CVE-2017-9800)  Daniel Shahaf and James McCoy discovered that Subversion did not  properly verify realms when using Cyrus SASL authentication. A  remote attacker could use this to possibly bypass intended access  restrictions. (CVE-2016-2167) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM:  libapache2-svn                  1.6.17dfsg-3ubuntu3.7  libsvn1                         1.6.17dfsg-3ubuntu3.7  subversion                      1.6.17dfsg-3ubuntu3.7 In general, a standard system update will make all the necessary changes. References:  https://www.ubuntu.com/usn/usn-3388-2  https://www.ubuntu.com/usn/usn-3388-1  CVE-2016-2167, CVE-2016-2168, CVE-2017-9800 --×uhW+JRLITtJ1V3Ayjn6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJZ734eAAoJEEW851uECx9phZIP/1Iu4ad63ONkCHBxv5gpq1At o9PMZ0zsG2+ZqjtNWZicWiH/5W4hC2/hsy6Uq6uVAzxw85lnZeqQuCU79IotuENA p1TjAOYOa8dDnGH42W+RkYgJ3KmrAVA3XfHiWIalurzH5SvaWcNdnxZTWRI1NtQ1 hZ1XOayghJP/C2Io0AYbktU7sS+BPUjpqI8CkfyIM8XPlma4uoZzIuWD/0VdWVss vE5M6pBOxKE5xMPA8ALtKwJoAAr6sDn/3XKrxmmfJ27MPjynE9e8eTu9vGzbmaXH gV8dSh1ffFHt9kWMW6Z9h8ckJ1VjkmJY4U5vpjd7p/0OhBYyYtQlmOZJ7STU/4tn 7v/WlVecrc0QQj0SYydVqEIEhIkWNdMsA5vL4UG5Vu5v5MvyGV/fx9f0QxZ4jeZH iVicCKAKYeHaB0QSY7MUsdhldhgufR8Jt+rpC5kXdRn5BNBsWGnyXc43CeTFJtm0 O11rGGL/5fFFKaPIcuPsgjvMvTKGiZVKUoi1KAVCx4dM77UzULJJ6jrHiJ0nc4rc H/0xBW86IryZ6oblsLz4yR16xefKpwgjxNwvDKrjY4Oj+YqPC+P64i+tD4E0y+AN b07YHJmpoghd2/rhzbssl/zxrhiQcXcl4lXwbVP/Cu/Vdqv8QUsQaWF/SNtU80NZ atQLKHqm58iLCzWytZPh =mo2K -----END PGP SIGNATURE----- --=-NuhW+JRLITtJ1V3Ayjn6-- --===============5443123873873936110== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============5443123873873936110==-- |