<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    網(wǎng)路冷眼@BlogJava

    熙熙攘攘一閑人 以冷靜的眼光觀察技術(shù)
    posts - 88, comments - 193, trackbacks - 0, articles - 28
      BlogJava :: 首頁(yè) :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理

    Subversion 1.4.5 Released

    August 27, 2007

    Subversion 1.4.5 was released today.  You can download the updated CollabNet Subversion binaries immediately.

    Subversion 1.4.5 contains a fix for a security exploit on Windows clients. This exploit was discovered and reported by researchers at the Colorado Research Institute for Security and Privacy.

    The only change from Subversion 1.4.4 is the patch for this security exploit.  Since the exploit only affects Windows clients, we decided to only release CollabNet Subversion 1.4.5 packages for Windows. There is no point for someone who is already running 1.4.4 on any other operating system to update to 1.4.5.

    I am not going to give a lot of details about the exploit, you can find more information at various security reporting sites, such as CVE.  I will say that it was a legitimate exposure that made it possible for the Subversion client to write files outside the normal working copy.  That being said, there are a couple of points to make:

    1. Creating the exploit requires commit access to the repository.  If you can trust the people who have write access to the repository, then you do not have too much to be concerned about. The keyword in that sentence is "trust". If you are checking out from a repository you cannot completely trust, such as on a public hosting service, then be careful and update to 1.4.5 first.
    2. While the exploit itself is pretty easy to produce, it is also pretty difficult to use it in a way that would cause harm.
    3. You can only create the exploit from a non-Windows platform.
    4. There is nothing terribly secretive about the exploit.  If you send commit emails, or even just browse your repository using svn ls, this exploit would stand out as not normal.

    If you are running a Subversion client on Windows, this would include the command line client as well as any graphical client such as TortoiseSVN or Subclipse, then you should definitely go ahead and install this version of Subversion.  I would recommend that users of earlier versions such as 1.3.2 or 1.2.3 also install this update immediately. The Subversion 1.4.5 client can talk to any 1.x version of the server, so there is no reason not to update your client (for compatibility: if you have the command line and a GUI client, update them both).

    Subversion servers are not affected by this exploit.  That being said, a Windows server that uses the Subversion client in scripts would still be vulnerable and should be updated to 1.4.5.

    http://blogs.open.collab.net/svn/2007/08/subversion-145-.html


    只有注冊(cè)用戶登錄后才能發(fā)表評(píng)論。


    網(wǎng)站導(dǎo)航:
     
    主站蜘蛛池模板: 亚洲国产天堂久久久久久| 国产亚洲综合一区二区三区| 亚洲天堂中文字幕在线| 亚洲午夜精品久久久久久浪潮| 91精品手机国产免费| aa级毛片毛片免费观看久| 亚洲熟妇无码AV不卡在线播放 | 久久久久亚洲AV成人片| 亚洲一区二区三区在线播放| 午夜一级免费视频| xx视频在线永久免费观看| 在线看片免费人成视频福利| 亚洲av无码成h人动漫无遮挡| 免费在线不卡视频| 久久WWW免费人成人片| 69影院毛片免费观看视频在线| 国产高清视频免费在线观看| 国产产在线精品亚洲AAVV| 男人的天堂av亚洲一区2区| 亚洲成AV人在线观看天堂无码| 亚洲av日韩片在线观看| 女人18毛片水真多免费看| 青青青国产在线观看免费网站| 在线美女免费观看网站h| 国偷自产一区二区免费视频| 亚洲AV无码成人专区| 亚洲精品免费在线视频| 亚洲A∨午夜成人片精品网站| 成人免费无码大片A毛片抽搐| 99re热免费精品视频观看| 91免费精品国自产拍在线不卡| 亚洲免费视频播放| 成人午夜免费福利视频| 18禁免费无码无遮挡不卡网站| 亚洲网站免费观看| 最近2022中文字幕免费视频| 久久九九兔免费精品6| 国产人成免费视频网站| 91免费资源网站入口| 成人免费无遮挡无码黄漫视频| 在线看片人成视频免费无遮挡|