OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
[ MDVSA-2015:005 ] subversion

securitymandriva.com
Date: Mon Jan 05 2015 - 07:28:00 CST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory MDVSA-2015:005
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : subversion
 Date : January 5, 2015
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated subversion packages fix security vulnerabilities:
 
 A NULL pointer dereference flaw was found in the way mod_dav_svn
 handled REPORT requests. A remote, unauthenticated attacker could
 use a crafted REPORT request to crash mod_dav_svn (CVE-2014-3580).
 
 A NULL pointer dereference flaw was found in the way mod_dav_svn
 handled URIs for virtual transaction names. A remote, unauthenticated
 attacker could send a request for a virtual transaction name that
 does not exist, causing mod_dav_svn to crash (CVE-2014-8108).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108
 http://advisories.mageia.org/MGASA-2014-0545.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 1f354ed65a056a0b70d9d2be13b02979 mbs1/x86_64/apache-mod_dav_svn-1.7.19-1.mbs1.x86_64.rpm
 3ae0fad77ef662db9cc15593e6b3e16c mbs1/x86_64/lib64svn0-1.7.19-1.mbs1.x86_64.rpm
 086f52b7c9c2613a9dfdc2edd6456b87 mbs1/x86_64/lib64svn-gnome-keyring0-1.7.19-1.mbs1.x86_64.rpm
 08502b3288cb52bbdcad5e1de62d7da1 mbs1/x86_64/lib64svnjavahl1-1.7.19-1.mbs1.x86_64.rpm
 1b9e41016558998ccbf885a9d903efb9 mbs1/x86_64/perl-SVN-1.7.19-1.mbs1.x86_64.rpm
 24e7f603b2d9fa85e74688410a653cd9 mbs1/x86_64/perl-svn-devel-1.7.19-1.mbs1.x86_64.rpm
 ab734f1e83a67fc462ad73c1dd997782 mbs1/x86_64/python-svn-1.7.19-1.mbs1.x86_64.rpm
 1fa42a41ed0d14e925e22ebaae5e4588 mbs1/x86_64/python-svn-devel-1.7.19-1.mbs1.x86_64.rpm
 3a9e6f623b9d56c101105bebb94482f0 mbs1/x86_64/ruby-svn-1.7.19-1.mbs1.x86_64.rpm
 3226dac8aba329eb3ce55da46f876ba2 mbs1/x86_64/ruby-svn-devel-1.7.19-1.mbs1.x86_64.rpm
 4bedf492fa0684cdb22594e26994511f mbs1/x86_64/subversion-1.7.19-1.mbs1.x86_64.rpm
 93e03dc4a459ce77bc7f9a597ecdd0e3 mbs1/x86_64/subversion-devel-1.7.19-1.mbs1.x86_64.rpm
 2f9467b156e9a560d06873eb0add5859 mbs1/x86_64/subversion-doc-1.7.19-1.mbs1.x86_64.rpm
 cb884252dd565d2df29645d7ab784728 mbs1/x86_64/subversion-gnome-keyring-devel-1.7.19-1.mbs1.x86_64.rpm
 d23255839ec971356cdcf831ee592374 mbs1/x86_64/subversion-server-1.7.19-1.mbs1.x86_64.rpm
 574b474f2eb518e0326f8975c354f19a mbs1/x86_64/subversion-tools-1.7.19-1.mbs1.x86_64.rpm
 a4002b39cd679324b1b3274db3c41511 mbs1/x86_64/svn-javahl-1.7.19-1.mbs1.x86_64.rpm
 64428cd0f639f7ec9dd033c04823f083 mbs1/SRPMS/subversion-1.7.19-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi. The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security. You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID Date User ID
 pub 1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFUqoNCmqjQ0CJFipgRAqwFAKCUALR1yu7OcAY6tP4LrYCdhQMJDACg7FG5
zlOOLTc8tjEXNuj5PnqflP0=
=huIz
-----END PGP SIGNATURE-----