USN-5372-1: Subversion vulnerabilities
12 April 2022
Several security issues were fixed in Subversion.
Releases
Packages
- subversion - Advanced version control system
Details
Evgeny Kotkov discovered that Subversion servers did not properly follow
path-based authorization rules in certain cases. An attacker could
potentially use this issue to retrieve information about private paths.
(CVE-2021-28544)
Thomas Weißschuh discovered that Subversion servers did not properly handle
memory in certain configurations. A remote attacker could potentially use
this issue to cause a denial of service or other unspecified impact.
(CVE-2022-24070)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.10
-
ruby-svn
-
1.14.1-3ubuntu0.1
-
python3-subversion
-
1.14.1-3ubuntu0.1
-
subversion-tools
-
1.14.1-3ubuntu0.1
-
libapache2-mod-svn
-
1.14.1-3ubuntu0.1
-
libsvn1
-
1.14.1-3ubuntu0.1
-
subversion
-
1.14.1-3ubuntu0.1
-
libsvn-java
-
1.14.1-3ubuntu0.1
-
libsvn-perl
-
1.14.1-3ubuntu0.1
Ubuntu 20.04
-
ruby-svn
-
1.13.0-3ubuntu0.1
-
subversion-tools
-
1.13.0-3ubuntu0.1
-
libapache2-mod-svn
-
1.13.0-3ubuntu0.1
-
python-subversion
-
1.13.0-3ubuntu0.1
-
libsvn1
-
1.13.0-3ubuntu0.1
-
subversion
-
1.13.0-3ubuntu0.1
-
libsvn-java
-
1.13.0-3ubuntu0.1
-
libsvn-perl
-
1.13.0-3ubuntu0.1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5450-1: subversion, libapache2-mod-svn, libsvn-dev, ruby-svn, libsvn-java, libsvn1, libsvn-doc, subversion-tools, libsvn-perl, python3-subversion