openSUSE Security Update : subversion (openSUSE-2015-948)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for subversion fixes the following issues :

- Apache Subversion 1.8.15 This release fixes one security
issue: Remotely triggerable heap overflow and
out-of-bounds read in mod_dav_svn caused by integer
overflow when parsing skel-encoded request bodies.
CVE-2015-5343 [boo#958300]

- fix a segfault with old style text delta

- fsfs: reduce memory allocation with Apache

- mod_dav_svn: emit first log items as soon as possible

- mod_dav_svn: use LimitXMLRequestBody for skel-encoded
requests

- swig: fix memory corruption in svn_client_copy_source_t

- better configure-time detection of httpd authz fix (drop
subversion-1.8.14-httpd-version-number-detection.patch,
replace subversion-1.8.9-allow-httpd-2.4.6.patch with
subversion-1.8.15-allow-httpd-2.4.6.patch as a result

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=958300

Solution :

Update the affected subversion packages.

Risk factor :

High / CVSS Base Score : 8.0
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 87623 ()

Bugtraq ID:

CVE ID: CVE-2015-5343

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now