openSUSE Security Update : subversion (openSUSE-SU-2013:1006-1)

high Nessus Plugin ID 75035

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of subversion includes several bug and security fixes.

- update to 1.7.10 [bnc#821505] CVE-2013-1968 CVE-2013-2088 CVE-2013-2112

- Client-side bugfixes :

- fix 'svn revert' 'no such table: revert_list' spurious error

- fix 'svn diff' doesn't show some locally added files

- fix changelist filtering when --changelist values aren't UTF8

- fix 'svn diff --git' shows wrong copyfrom

- fix 'svn diff -x-w' shows wrong changes

- fix 'svn blame' sometimes shows every line as modified

- fix regression in 'svn status -u' output for externals

- fix file permissions change on commit of file with keywords

- improve some fatal error messages

- fix externals not removed when working copy is made shallow

- Server-side bugfixes :

- fix repository corruption due to newline in filename

- fix svnserve exiting when a client connection is aborted

- fix svnserve memory use after clear

- fix repository corruption on power/disk failure on Windows

- Developer visible changes :

- make get-deps.sh compatible with Solaris /bin/sh

- fix infinite recursion bug in get-deps.sh

- fix uninitialised output parameter of svn_fs_commit_txn()

- Bindings :

- fix JavaHL thread-safety bug

Solution

Update the affected subversion packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=821505

https://lists.opensuse.org/opensuse-updates/2013-06/msg00136.html

Plugin Details

Severity: High

ID: 75035

File Name: openSUSE-2013-494.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:subversion-bash-completion, p-cpe:/a:novell:opensuse:subversion-server, p-cpe:/a:novell:opensuse:subversion-devel, p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0-debuginfo, p-cpe:/a:novell:opensuse:subversion-python, p-cpe:/a:novell:opensuse:subversion-tools-debuginfo, p-cpe:/a:novell:opensuse:subversion-python-debuginfo, p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0-debuginfo, p-cpe:/a:novell:opensuse:subversion-perl, p-cpe:/a:novell:opensuse:subversion-debuginfo, p-cpe:/a:novell:opensuse:subversion-tools, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:subversion-perl-debuginfo, p-cpe:/a:novell:opensuse:subversion, p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0, p-cpe:/a:novell:opensuse:subversion-debugsource, p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0, p-cpe:/a:novell:opensuse:subversion-server-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/4/2013

Reference Information

CVE: CVE-2013-1968, CVE-2013-2088, CVE-2013-2112

BID: 60264, 60265, 60267