Subversion 1.0.3 released. *SECURITY FIX*
From: Ben Reser <ben_at_reser.org>
 
Date: 2004-05-19 12:20:50 CEST 
Subversion 1.0.3 is ready. Grab it from:
   http://subversion.tigris.org/files/documents/15/13430/subversion-1.0.3.tar.gz
 The MD5 checksums are:
   1d5722a515be8f1aa6cfb779d99c6a11  subversion-1.0.3.tar.gz
 Subversion versions up to and including 1.0.2 have a buffer overflow in
 Both client and server are vulnerable.  The server is vulnerable over
 Additionally, clients with shared working copies, or permissions that
 Severity:
 Severity ranges from "Denial of Service" to, potentially, "Arbitrary
 The server vulnerabilities can be triggered without write/commit access
 Workarounds:
 There are no workarounds except to disallow public access.  Even then
 Recommendations:
 We recommend all users upgrade to 1.0.3.
 References:
 CAN-2004-0397: subversion sscanf stack overflow via revision date
 Note:
 There was a similar vulnerability in the Neon HTTP library up to and
 Questions, comments, and bug reports to users_at_subversion.tigris.org.
 Thanks,
 --------------------8-<-------cut-here---------8-<-----------------------
  User-visible-changes:
 ---------------------------------------------------------------------
  | 
This is an archived mail posted to the Subversion Dev mailing list.
This site is subject to the Apache Privacy Policy and the Apache Public Forum Archive Policy.