Subversion 1.0.5 released. *SECURITY FIX*
From: Ben Reser <ben_at_reser.org>
Date: 2004-06-10 22:08:30 CEST
Subversion 1.0.5 is ready. Grab it from:
http://subversion.tigris.org/tarballs/subversion-1.0.5.tar.gz
The MD5 checksums are:
96856d7e1a6b056a17833d10d3cd7623 subversion-1.0.5.tar.gz
Subversion versions up to and including 1.0.4 have a potential
This affects only sites running svnserve. It does not affect
Details:
The svn protocol sends strings as a length followed by the string. The
The parsing code with the flaw is shared by both the svnserve server and
Severity:
Severity ranges from "Denial of Service" to, potentially, "Arbitrary
Since the error is in the parsing of the protocol, including the parsing
The Denial of Service attack is reasonably easy to carry out, while
Workarounds:
Disable svnserve and use DAV (http://) instead.
Recommendations:
We recommend all users upgrade to 1.0.5.
References:
CAN-2004-0413: Subversion svn:// protocol string parsing error.
Questions, comments, and bug reports to users_at_subversion.tigris.org.
Thanks,
--------------------8-<-------cut-here---------8-<-----------------------
User-visible-changes:
---------------------------------------------------------------------
|
This is an archived mail posted to the Subversion Dev mailing list.
This site is subject to the Apache Privacy Policy and the Apache Public Forum Archive Policy.