Debian Security Advisory DSA 1855-1 (subversion)

Summary
The remote host is missing an update to subversion announced via advisory DSA 1855-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201855-1
Insight
Matt Lewis discovered that Subversion performs insufficient input validation of svndiff streams. Malicious servers could cause heap overflows in clients, and malicious clients with commit access could cause heap overflows in servers, possibly leading to arbitrary code execution in both cases. For the old stable distribution (etch), this problem has been fixed in version 1.4.2dfsg1-3. For the stable distribution (lenny), this problem has been fixed in version 1.5.1dfsg1-4. For the unstable distribution (sid), this problem has been fixed in version 1.6.4dfsg-1. We recommend that you upgrade your Subversion packages.