—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:005
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : subversion
Date : January 5, 2015
Affected: Business Server 1.0
_______________________________________________________________________
Problem Description:
Updated subversion packages fix security vulnerabilities:
A NULL pointer dereference flaw was found in the way mod_dav_svn
handled REPORT requests. A remote, unauthenticated attacker could
use a crafted REPORT request to crash mod_dav_svn (CVE-2014-3580).
A NULL pointer dereference flaw was found in the way mod_dav_svn
handled URIs for virtual transaction names. A remote, unauthenticated
attacker could send a request for a virtual transaction name that
does not exist, causing mod_dav_svn to crash (CVE-2014-8108).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108
http://advisories.mageia.org/MGASA-2014-0545.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
1f354ed65a056a0b70d9d2be13b02979 mbs1/x86_64/apache-mod_dav_svn-1.7.19-1.mbs1.x86_64.rpm
3ae0fad77ef662db9cc15593e6b3e16c mbs1/x86_64/lib64svn0-1.7.19-1.mbs1.x86_64.rpm
086f52b7c9c2613a9dfdc2edd6456b87 mbs1/x86_64/lib64svn-gnome-keyring0-1.7.19-1.mbs1.x86_64.rpm
08502b3288cb52bbdcad5e1de62d7da1 mbs1/x86_64/lib64svnjavahl1-1.7.19-1.mbs1.x86_64.rpm
1b9e41016558998ccbf885a9d903efb9 mbs1/x86_64/perl-SVN-1.7.19-1.mbs1.x86_64.rpm
24e7f603b2d9fa85e74688410a653cd9 mbs1/x86_64/perl-svn-devel-1.7.19-1.mbs1.x86_64.rpm
ab734f1e83a67fc462ad73c1dd997782 mbs1/x86_64/python-svn-1.7.19-1.mbs1.x86_64.rpm
1fa42a41ed0d14e925e22ebaae5e4588 mbs1/x86_64/python-svn-devel-1.7.19-1.mbs1.x86_64.rpm
3a9e6f623b9d56c101105bebb94482f0 mbs1/x86_64/ruby-svn-1.7.19-1.mbs1.x86_64.rpm
3226dac8aba329eb3ce55da46f876ba2 mbs1/x86_64/ruby-svn-devel-1.7.19-1.mbs1.x86_64.rpm
4bedf492fa0684cdb22594e26994511f mbs1/x86_64/subversion-1.7.19-1.mbs1.x86_64.rpm
93e03dc4a459ce77bc7f9a597ecdd0e3 mbs1/x86_64/subversion-devel-1.7.19-1.mbs1.x86_64.rpm
2f9467b156e9a560d06873eb0add5859 mbs1/x86_64/subversion-doc-1.7.19-1.mbs1.x86_64.rpm
cb884252dd565d2df29645d7ab784728 mbs1/x86_64/subversion-gnome-keyring-devel-1.7.19-1.mbs1.x86_64.rpm
d23255839ec971356cdcf831ee592374 mbs1/x86_64/subversion-server-1.7.19-1.mbs1.x86_64.rpm
574b474f2eb518e0326f8975c354f19a mbs1/x86_64/subversion-tools-1.7.19-1.mbs1.x86_64.rpm
a4002b39cd679324b1b3274db3c41511 mbs1/x86_64/svn-javahl-1.7.19-1.mbs1.x86_64.rpm
64428cd0f639f7ec9dd033c04823f083 mbs1/SRPMS/subversion-1.7.19-1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFUqoNCmqjQ0CJFipgRAqwFAKCUALR1yu7OcAY6tP4LrYCdhQMJDACg7FG5
zlOOLTc8tjEXNuj5PnqflP0=
=huIz
—–END PGP SIGNATURE—–
To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________