Security update for subversion
Announcement ID: | SUSE-SU-2022:1483-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has one security fix can now be installed.
Description:
This update for subversion fixes the following issues:
- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache HTTP server. This could be exploited by a remote attacker to cause a denial of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may reveal the original path of files protected by path-based authorization (bsc#1197939).
The following non-security bugs were fixed:
- Skip failing test on s390[x] (bsc#1198503).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1483=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64)
- libsvn_auth_gnome_keyring-1-0-debuginfo-1.10.6-3.6.1
- subversion-perl-1.10.6-3.6.1
- subversion-1.10.6-3.6.1
- libsvn_auth_gnome_keyring-1-0-1.10.6-3.6.1
- subversion-python-debuginfo-1.10.6-3.6.1
- subversion-devel-1.10.6-3.6.1
- subversion-debugsource-1.10.6-3.6.1
- subversion-python-1.10.6-3.6.1
- subversion-tools-debuginfo-1.10.6-3.6.1
- subversion-server-1.10.6-3.6.1
- subversion-perl-debuginfo-1.10.6-3.6.1
- subversion-server-debuginfo-1.10.6-3.6.1
- subversion-debuginfo-1.10.6-3.6.1
- subversion-tools-1.10.6-3.6.1
-
SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch)
- subversion-bash-completion-1.10.6-3.6.1