[BSA-017] Security Update for subversion
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sven Hoexter uploaded new packages for subversion which fixed the
following security problems:
CVE-2010-4539
A NULL pointer dereference flaw exisits in mod_dav_svn, the Apache
httpd module for the Subversion server, when listing of repositories
(SVNListParentPath directive) is enabled. A remote user could use
this flaw to cause denial of service (particular httpd thread crash).
http://security-tracker.debian.org/tracker/CVE-2010-4539
CVE-2010-4644
A server-side memory leak allows remote users to cause a denial
of service (memory consumption and daemon outage or crash) via
Subversion client "blame" or "log" operations, when the "-g" option
(request to display additional merge history) is used.
http://security-tracker.debian.org/tracker/CVE-2010-4644
For the lenny-backports distribution, the problems have been fixed in
version 1.6.12dfsg-4~bpo50+1.
For the upcoming stable version (squeeze) and the unstable distribution
(sid), these problems have been fixed in version 1.6.12dfsg-4.
Upgrade instructions
- --------------------
If you don't use pinning (see [1]) you have to update the package
manually via "apt-get -t lenny-backports install <packagelist>" with
the packagelist of your installed packages affected by this update.
[1] <http://backports.debian.org/Instructions>
We recommend to pin (in /etc/apt/preferences) the backports repository to
200 so that new versions of installed backports will be installed
automatically.
Package: *
Pin: release a=lenny-backports
Pin-Priority: 200
- --
Michael Diers, elego Software Solutions GmbH, http://www.elego.de
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk0rIcUACgkQcEKlWnqVgz1VAQCeJ3XPwuceipQI5IyrnLTuWF0v
qs4An0s5fF/wTZtX9N9fv5iktxmRaqJE
=mBHx
-----END PGP SIGNATURE-----
Reply to: