Path to this page:
./
devel/ruby-subversion,
Ruby bindings for Subversion
Branch: CURRENT,
Version: 1.14.2nb3,
Package name: ruby31-subversion-1.14.2nb3,
Maintainer: pkgsrc-usersThe goal of the Subversion project is to build a version control system that
is a compelling replacement for CVS in the open source community. The software
is released under an Apache/BSD-style open source license.
This package contains the Ruby bindings to the Subversion libraries.
Required to run:[
www/serf] [
devel/subversion-base] [
archivers/lz4] [
converters/utf8proc] [
lang/ruby26-base]
Required to build:[
pkgtools/cwrappers]
Package options: serf
Master sites: (Expand)
Filesize: 8404.854 KB
Version history: (Expand)
- (2022-11-23) Updated to version: ruby31-subversion-1.14.2nb3
- (2022-06-28) Updated to version: ruby27-subversion-1.14.2nb2
- (2022-04-20) Updated to version: ruby27-subversion-1.14.2nb1
- (2022-04-12) Updated to version: ruby27-subversion-1.14.2
- (2021-12-08) Updated to version: ruby27-subversion-1.14.1nb3
- (2021-12-01) Updated to version: ruby27-subversion-1.14.1nb2
CVS history: (Expand)
2022-11-23 17:21:30 by Adam Ciarcinski | Files touched by this commit (1878) |  |
Log message:
massive revision bump after textproc/icu update
|
2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952) |
Log message:
*: recursive bump for perl 5.36
|
2022-04-18 21:12:27 by Adam Ciarcinski | Files touched by this commit (1798) |  |
Log message:
revbump for textproc/icu update
|
2022-04-12 18:24:29 by Benny Siegert | Files touched by this commit (7) |  |
Log message:
subversion: update to 1.4.2 (security).
HIS RELEASE CONTAINS TWO IMPORTANT SECURITY FIXES:
CVE-2021-28544
"SVN authz protected copyfrom paths regression"
The full security advisory for CVE-2021-28544 is available at:
https://subversion.apache.org/security/CVE-2021-28544-advisory.txt
https://subversion.apache.org/security/CVE-2021-28544-advisory.txt.asc
A brief summary of this advisory follows:
Subversion servers reveal 'copyfrom' paths that should be hidden according to
configured path-based authorization (authz) rules. When a node has been
copied from a protected location, users with access to the copy can see the
`copyfrom' path of the original. This also reveals the fact that
the node was copied.
Only the 'copyfrom' path is revealed; not its contents. Both httpd
and svnserve
servers are vulnerable.
We recommend all users to upgrade to a known fixed release of the
Subversion server.
This issue was reported by Evgeny Kotkov
CVE-2022-24070
"Subversion's mod_dav_svn is vulnerable to memory corruption"
The full security advisory for CVE-2022-24070 is available at:
https://subversion.apache.org/security/CVE-2022-24070-advisory.txt
https://subversion.apache.org/security/CVE-2022-24070-advisory.txt.asc
A brief summary of this advisory follows:
While looking up path-based authorization rules, mod_dav_svn servers
may attempt to use memory which has already been freed.
We recommend all users to upgrade to a known fixed release of the
Subversion server.
This issue was reported by Thomas Weißschuh
|
2021-12-08 17:07:18 by Adam Ciarcinski | Files touched by this commit (3063) |
Log message:
revbump for icu and libffi
|
2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575) |
Log message:
*: recursive bump for perl 5.34
|
2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822) |
Log message:
revbump for textproc/icu
|
2021-02-14 16:09:20 by Adam Ciarcinski | Files touched by this commit (9) |  |
Log message:
subversion: updated to 1.14.1
Subversion 1.14.1.
This is a stable bugfix and security release of the Apache Subversion
open source version control system.
THIS RELEASE CONTAINS AN IMPORTANT SECURITY FIX:
CVE-2020-17525
"Remote unauthenticated denial-of-service in Subversion mod_authz_svn"
The full security advisory for CVE-2020-17525 is available at:
https://subversion.apache.org/security/CVE-2020-17525-advisory.txt
A brief summary of this advisory follows:
Subversion's mod_authz_svn module will crash if the server is using
in-repository authz rules with the AuthzSVNReposRelativeAccessFile
option and a client sends a request for a non-existing repository URL.
This can lead to disruption for users of the service.
We recommend all users to upgrade to the 1.10.7 or 1.14.1 release
of the Subversion mod_dav_svn server.
As a workaround, the use of in-repository authz rules files with
the AuthzSVNReposRelativeAccessFile can be avoided by switching
to an alternative configuration which fetches an authz rules file
from the server's filesystem, rather than from an SVN repository.
|