{"id":"UBUNTU-CVE-2016-2168","details":"The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.","modified":"2026-01-30T00:37:17.083461Z","published":"2016-05-05T00:00:00Z","related":["USN-3388-2"],"upstream":["CVE-2016-2168"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2168"},{"type":"REPORT","url":"https://subversion.apache.org/security/CVE-2016-2168-advisory.txt"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3388-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-2168"}],"affected":[{"package":{"name":"subversion","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/subversion@1.8.8-1ubuntu3.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.8-1ubuntu3.3"}]}],"versions":["1.7.9-1+nmu6ubuntu3","1.7.13-2ubuntu1","1.7.13-2ubuntu2","1.7.13-2ubuntu3","1.7.14-1ubuntu2","1.8.5-2ubuntu3","1.8.8-1ubuntu2","1.8.8-1ubuntu3","1.8.8-1ubuntu3.1","1.8.8-1ubuntu3.2"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache2-mod-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libapache2-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-dev","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-java","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-perl","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-ruby1.8","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn1","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"python-subversion","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"ruby-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"subversion","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"subversion-tools","binary_version":"1.8.8-1ubuntu3.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2168.json"}},{"package":{"name":"subversion","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/subversion@1.9.3-2ubuntu1.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.3-2ubuntu1.1"}]}],"versions":["1.8.13-1ubuntu3","1.9.2-3ubuntu1","1.9.2-3ubuntu2","1.9.3-1ubuntu1","1.9.3-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache2-mod-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libapache2-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-dev","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-java","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-perl","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-ruby1.8","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn1","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"python-subversion","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"ruby-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"subversion","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"subversion-tools","binary_version":"1.9.3-2ubuntu1.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2168.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}