Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in Subversion
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in Subversion
ID: FEDORA-2013-15717
Distribution: Fedora
Plattformen: Fedora 19
Datum: So, 8. September 2013, 10:22
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277
Applikationen: Subversion

Originalnachricht

Name        : subversion
Product : Fedora 19
Version : 1.7.13
Release : 1.fc19
URL : http://subversion.apache.org/
Summary : A Modern Concurrent Version Control System
Description :
Subversion is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a
hierarchy of files and directories while keeping a history of all
changes. Subversion only stores the differences between versions,
instead of every complete file. Subversion is intended to be a
compelling replacement for CVS.

-------------------------------------------------------------------------------
-
Update Information:

This update includes the latest stable release of Apache Subversion 1.7,
version 1.7.13. One security vulnerability is fixed in this update:

svnserve takes a --pid-file option which creates a file containing the process
id it is running as. It does not take steps to ensure that the file it has been directed at is not a symlink. If the pid file is in a directory writeable by unprivileged users, the destination could be replaced by a symlink allowing for privilege escalation. svnserve does not create a pid file by default. (CVE-2013-4277)

Several bug fixes are also included:

* merge: fix bogus mergeinfo with conflicting file merges
* diff: fix duplicated path component in '--summarize' output
* mod_dav_svn: better status codes for commit failures
* mod_dav_svn: do not map requests to filesystem

-------------------------------------------------------------------------------
-
ChangeLog:

* Tue Sep 3 2013 Joe Orton <jorton@redhat.com> - 1.7.13-1
- update to 1.7.13 (#1003070)
- move bash completions out of /etc (#922993)
* Thu Jul 25 2013 Joe Orton <jorton@redhat.com> - 1.7.11-1
- update to 1.7.11
- use full relro in mod_dav_svn build (#973694)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1000202 - CVE-2013-4277 subversion: svnserve is vulnerable to
symlink attack
https://bugzilla.redhat.com/show_bug.cgi?id=1000202
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update subversion' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung