Security update for subversion

SUSE Security Update: Security update for subversion
Announcement ID: SUSE-SU-2014:0129-1
Rating: moderate
References: #850667
Affected Products:
  • SUSE Studio Onsite 1.3
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Software Development Kit 11 SP2

  • An update that fixes two vulnerabilities is now available.

    Description:


    The following issues have been fixed in subversion:

    * mod_dontdothat did not restrict requests from serf
    based clients (CVE-2013-4505)
    * DoS via an assert in mod_dav_svn (CVE-2013-4558)

    Security Issue references:

    * CVE-2013-4505
    >
    * CVE-2013-4558
    >

    Indications:

    Everybody should update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Studio Onsite 1.3:
      zypper in -t patch slestso13-subversion-8770
    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-subversion-8771
    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-subversion-8770

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Studio Onsite 1.3 (x86_64):
    • subversion-1.6.17-1.25.1
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
    • subversion-1.6.17-1.25.1
    • subversion-devel-1.6.17-1.25.1
    • subversion-perl-1.6.17-1.25.1
    • subversion-python-1.6.17-1.25.1
    • subversion-server-1.6.17-1.25.1
    • subversion-tools-1.6.17-1.25.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • subversion-1.6.17-1.25.1
    • subversion-devel-1.6.17-1.25.1
    • subversion-perl-1.6.17-1.25.1
    • subversion-python-1.6.17-1.25.1
    • subversion-server-1.6.17-1.25.1
    • subversion-tools-1.6.17-1.25.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-4505.html
    • http://support.novell.com/security/cve/CVE-2013-4558.html
    • https://bugzilla.novell.com/850667
    • http://download.novell.com/patch/finder/?keywords=2049928450e987f08e12a06dc79272fd
    • http://download.novell.com/patch/finder/?keywords=8fb03f08094944d594f078df4a036170