|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 3231-1 (subversion - security update)|
|Summary:||Several vulnerabilities were discovered;in Subversion, a version control system. The Common Vulnerabilities and Exposures;project identifies the following problems:;;CVE-2015-0248;Subversion mod_dav_svn and svnserve were vulnerable to a remotely;triggerable assertion DoS vulnerability for certain requests with;dynamically evaluated revision numbers.;;CVE-2015-0251;Subversion HTTP servers allow spoofing svn:author property values;for new revisions via specially crafted v1 HTTP protocol request;sequences.|
Several vulnerabilities were discovered
in Subversion, a version control system. The Common Vulnerabilities and Exposures
project identifies the following problems:
Subversion mod_dav_svn and svnserve were vulnerable to a remotely
triggerable assertion DoS vulnerability for certain requests with
dynamically evaluated revision numbers.
Subversion HTTP servers allow spoofing svn:author property values
for new revisions via specially crafted v1 HTTP protocol request
subversion on Debian Linux
For the stable distribution (wheezy),
these problems have been fixed in version 1.6.17dfsg-4+deb7u9.
For the upcoming stable distribution (jessie), these problems have been
fixed in version 1.8.10-6.
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your subversion packages.
Common Vulnerability Exposure (CVE) ID: CVE-2015-0248|
BugTraq ID: 74260
Debian Security Information: DSA-3231 (Google Search)
RedHat Security Advisories: RHSA-2015:1633
RedHat Security Advisories: RHSA-2015:1742
SuSE Security Announcement: openSUSE-SU-2015:0672 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-0251
BugTraq ID: 74259
|Copyright||Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.