Updated subversion packages fix security vulnerabilities
Publication date: 05 May 2016Modification date: 05 May 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-2167 , CVE-2016-2168
Description
Updated subversion packages fix security vulnerabilities:
Daniel Shahaf and James McCoy discovered that an implementation error in the
authentication against the Cyrus SASL library would permit a remote user to
specify a realm string which is a prefix of the expected realm string and
potentially allowing a user to authenticate using the wrong realm
(CVE-2016-2167).
Ivan Zhakov of VisualSVN discovered a remotely triggerable denial of service
vulnerability in the mod_authz_svn module during COPY or MOVE authorization
check. An authenticated remote attacker could take advantage of this flaw to
cause a denial of service (Subversion server crash) via COPY or MOVE requests
with specially crafted header (CVE-2016-2168).
References
- https://bugs.mageia.org/show_bug.cgi?id=18299
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E
- http://svn.apache.org/repos/asf/subversion/tags/1.8.16/CHANGES
- http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
- http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
- https://www.debian.org/security/2016/dsa-3561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
SRPMS
5/core
- subversion-1.8.16-1.mga5