Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: subversion on SL5.x, SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Friday 12th April 2013 17:37:55 UTC (over 3 years ago)
Synopsis:          Moderate: subversion security update
Issue Date:        2013-04-11
CVE Numbers:       CVE-2013-1845
                   CVE-2013-1846
                   CVE-2013-1847
                   CVE-2013-1849
--

A NULL pointer dereference flaw was found in the way the mod_dav_svn
module handled PROPFIND requests on activity URLs. A remote attacker could
use this flaw to cause the httpd process serving the request to crash.
(CVE-2013-1849)

A flaw was found in the way the mod_dav_svn module handled large numbers
of properties (such as those set with the "svn propset" command). A
malicious, remote user could use this flaw to cause the httpd process
serving the request to consume an excessive amount of system memory.
(CVE-2013-1845)

Two NULL pointer dereference flaws were found in the way the mod_dav_svn
module handled LOCK requests on certain types of URLs. A malicious, remote
user could use these flaws to cause the httpd process serving the request
to crash. (CVE-2013-1846, CVE-2013-1847)

Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only
caused a temporary denial of service, as the Apache HTTP Server started a
new process to replace the crashed child process. When using prefork MPM,
the crash only affected the attacker. When using worker (threaded) MPM,
the connections of other users may have been interrupted.

After installing the updated packages, you must restart the httpd daemon,
if you are using mod_dav_svn, for the update to take effect.
--

SL5
  x86_64
    mod_dav_svn-1.6.11-11.el5_9.x86_64.rpm
    subversion-1.6.11-11.el5_9.i386.rpm
    subversion-1.6.11-11.el5_9.x86_64.rpm
    subversion-debuginfo-1.6.11-11.el5_9.i386.rpm
    subversion-debuginfo-1.6.11-11.el5_9.x86_64.rpm
    subversion-devel-1.6.11-11.el5_9.i386.rpm
    subversion-devel-1.6.11-11.el5_9.x86_64.rpm
    subversion-javahl-1.6.11-11.el5_9.x86_64.rpm
    subversion-perl-1.6.11-11.el5_9.x86_64.rpm
    subversion-ruby-1.6.11-11.el5_9.x86_64.rpm
  i386
    mod_dav_svn-1.6.11-11.el5_9.i386.rpm
    subversion-1.6.11-11.el5_9.i386.rpm
    subversion-debuginfo-1.6.11-11.el5_9.i386.rpm
    subversion-devel-1.6.11-11.el5_9.i386.rpm
    subversion-javahl-1.6.11-11.el5_9.i386.rpm
    subversion-perl-1.6.11-11.el5_9.i386.rpm
    subversion-ruby-1.6.11-11.el5_9.i386.rpm
SL6
  x86_64
    mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm
    subversion-1.6.11-9.el6_4.i686.rpm
    subversion-1.6.11-9.el6_4.x86_64.rpm
    subversion-debuginfo-1.6.11-9.el6_4.i686.rpm
    subversion-debuginfo-1.6.11-9.el6_4.x86_64.rpm
    subversion-devel-1.6.11-9.el6_4.i686.rpm
    subversion-devel-1.6.11-9.el6_4.x86_64.rpm
    subversion-gnome-1.6.11-9.el6_4.i686.rpm
    subversion-gnome-1.6.11-9.el6_4.x86_64.rpm
    subversion-javahl-1.6.11-9.el6_4.i686.rpm
    subversion-javahl-1.6.11-9.el6_4.x86_64.rpm
    subversion-kde-1.6.11-9.el6_4.i686.rpm
    subversion-kde-1.6.11-9.el6_4.x86_64.rpm
    subversion-perl-1.6.11-9.el6_4.i686.rpm
    subversion-perl-1.6.11-9.el6_4.x86_64.rpm
    subversion-ruby-1.6.11-9.el6_4.i686.rpm
    subversion-ruby-1.6.11-9.el6_4.x86_64.rpm
  i386
    mod_dav_svn-1.6.11-9.el6_4.i686.rpm
    subversion-1.6.11-9.el6_4.i686.rpm
    subversion-debuginfo-1.6.11-9.el6_4.i686.rpm
    subversion-devel-1.6.11-9.el6_4.i686.rpm
    subversion-gnome-1.6.11-9.el6_4.i686.rpm
    subversion-javahl-1.6.11-9.el6_4.i686.rpm
    subversion-kde-1.6.11-9.el6_4.i686.rpm
    subversion-perl-1.6.11-9.el6_4.i686.rpm
    subversion-ruby-1.6.11-9.el6_4.i686.rpm
  noarch
    subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm

- Scientific Linux Development Team
 
CD: 2ms