Fedora 20 : subversion-1.8.8-1.fc20 (2014-3365)

medium Nessus Plugin ID 73033

Synopsis

The remote Fedora host is missing a security update.

Description

This update includes the latest stable release of Subversion, fixing a security issue (CVE-2014-0032) :

Subversion's mod_dav_svn Apache HTTPD server module will crash when it receives an OPTIONS request against the server root and Subversion is configured to handle the server root and SVNListParentPath is on.

This can lead to a DoS. There are no known instances of this problem being exploited in the wild, but the details of how to exploit it have been disclosed on the Subversion development mailing list.

For more information, see :

https://subversion.apache.org/security/CVE-2014-0032-advisory.txt

A number of client-side bug fixes are included in this update :

- fix automatic relocate for wcs not at repository root

- wc: improve performance when used with SQLite 3.8

- copy: fix some scenarios that broke the working copy

- move: fix errors when moving files between an external and the parent working copy

- log: resolve performance regression in certain scenarios

- merge: decrease work to detect differences between 3 files

- commit: don't change file permissions inappropriately

- commit: fix assertion due to invalid pool lifetime

- version: don't cut off the distribution version on Linux

- flush stdout before exiting to avoid information being lost

- status: fix missing sentinel value on warning codes

- update/switch: improve some WC db queries that may return incorrect results depending on how SQLite is built

Server-side bugfixes :

- reduce memory usage during checkout and export

- fsfs: create rep-cache.db with proper permissions

- mod_dav_svn: prevent crashes with SVNListParentPath on (CVE-2014-0032)

- mod_dav_svn: fix SVNAllowBulkUpdates directive merging

- mod_dav_svn: include requested property changes in reports

- svnserve: correct default cache size in help text

- svnadmin dump: reduce size of dump files with '--deltas'

- resolve integer underflow that resulted in infinite loops

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected subversion package.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1062042

http://www.nessus.org/u?b9d1bef2

https://subversion.apache.org/security/CVE-2014-0032-advisory.txt

Plugin Details

Severity: Medium

ID: 73033

File Name: fedora_2014-3365.nasl

Version: 1.5

Type: local

Agent: unix

Published: 3/17/2014

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:subversion, cpe:/o:fedoraproject:fedora:20

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 3/4/2014

Reference Information

CVE: CVE-2014-0032

FEDORA: 2014-3365