openSUSE Security Update : subversion (openSUSE-SU-2013:1860-1)

low Nessus Plugin ID 75226

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes the following issues with subversion :

- bnc#850747: update to 1.7.14

- CVE-2013-4505: mod_dontdothat does not restrict requests from serf clients.

- CVE-2013-4558: mod_dav_svn assertion triggered by autoversioning commits.

+ Client- and server-side bugfixes :

- fix assertion on urls of the form 'file://./'

+ Client-side bugfixes :

- upgrade: fix an assertion when used with pre-1.3 wcs

- fix externals that point at redirected locations

- diff: fix incorrect calculation of changes in some cases

- diff: fix errors with added/deleted targets

+ Server-side bugfixes :

- mod_dav_svn: Prevent crashes with some 3rd party modules

- fix OOM on concurrent requests at threaded server start

- fsfs: limit commit time of files with deep change histories

- mod_dav_svn: canonicalize paths properly

+ Other tool improvements and bugfixes :

- mod_dontdothat: Fix the uri parser

+ Developer-visible changes :

- javahl: canonicalize path for streamFileContent method

+ require python-sqlite when running regression tests

Solution

Update the affected subversion packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=850667

https://bugzilla.novell.com/show_bug.cgi?id=850747

https://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html

Plugin Details

Severity: Low

ID: 75226

File Name: openSUSE-2013-962.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:subversion-bash-completion, p-cpe:/a:novell:opensuse:subversion-server, p-cpe:/a:novell:opensuse:subversion-devel, p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0-debuginfo, p-cpe:/a:novell:opensuse:subversion-python, p-cpe:/a:novell:opensuse:subversion-tools-debuginfo, p-cpe:/a:novell:opensuse:subversion-python-debuginfo, p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0-debuginfo, p-cpe:/a:novell:opensuse:subversion-perl, p-cpe:/a:novell:opensuse:subversion-debuginfo, p-cpe:/a:novell:opensuse:subversion-tools, cpe:/o:novell:opensuse:12.3, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:subversion-perl-debuginfo, p-cpe:/a:novell:opensuse:subversion, p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0, p-cpe:/a:novell:opensuse:subversion-debugsource, p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0, p-cpe:/a:novell:opensuse:subversion-server-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/30/2013

Reference Information

CVE: CVE-2013-4505, CVE-2013-4558

BID: 63966, 63981