Mandriva Linux Security Advisory : subversion (MDVSA-2013:173)

high Nessus Plugin ID 66890

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been found and corrected in subversion :

If a filename which contains a newline character (ASCII 0x0a) is committed to a repository using the FSFS format, the resulting revision is corrupt. This can lead to disruption for users of the repository (CVE-2013-1968).

Subversion's svnserve server process may exit when an incoming TCP connection is closed early in the connection process. This can lead to disruption for users of the server (CVE-2013-2112).

This advisory provides the latest versions of subversion (1.6.23/1.7.10) which is not vulnerable to these issues.

Solution

Update the affected packages.

See Also

http://subversion.apache.org/security/CVE-2013-1968-advisory.txt

http://subversion.apache.org/security/CVE-2013-2112-advisory.txt

Plugin Details

Severity: High

ID: 66890

File Name: mandriva_MDVSA-2013-173.nasl

Version: 1.8

Type: local

Published: 6/14/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:apache-mod_dav_svn, p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0, p-cpe:/a:mandriva:linux:lib64svn0, p-cpe:/a:mandriva:linux:lib64svnjavahl1, p-cpe:/a:mandriva:linux:perl-svn, p-cpe:/a:mandriva:linux:perl-svn-devel, p-cpe:/a:mandriva:linux:python-svn, p-cpe:/a:mandriva:linux:python-svn-devel, p-cpe:/a:mandriva:linux:ruby-svn, p-cpe:/a:mandriva:linux:ruby-svn-devel, p-cpe:/a:mandriva:linux:subversion, p-cpe:/a:mandriva:linux:subversion-devel, p-cpe:/a:mandriva:linux:subversion-doc, p-cpe:/a:mandriva:linux:subversion-gnome-keyring-devel, p-cpe:/a:mandriva:linux:subversion-server, p-cpe:/a:mandriva:linux:subversion-tools, p-cpe:/a:mandriva:linux:svn-javahl, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/13/2013

Reference Information

CVE: CVE-2013-1968, CVE-2013-2112

BID: 60264, 60267

MDVSA: 2013:173