ALT-BU-2015-2599-1
Branch sisyphus update bulletin.
Package subversion updated to version 1.8.13-alt1 for branch sisyphus in task 147891.
Closed vulnerabilities
BDU:2015-00404
Уязвимость программного обеспечения Apache Subversion, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2015-00405
Уязвимость программного обеспечения Apache Subversion, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
BDU:2020-04532
Уязвимость серверного процессов mod_dav_svn и svnserve централизованной системы управления версиями Subversion, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-1845
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0932
- openSUSE-SU-2013:0932
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- RHSA-2013:0737
- RHSA-2013:0737
- http://subversion.apache.org/security/CVE-2013-1845-advisory.txt
- http://subversion.apache.org/security/CVE-2013-1845-advisory.txt
- MDVSA-2013:153
- MDVSA-2013:153
- USN-1893-1
- USN-1893-1
- https://bugzilla.redhat.com/show_bug.cgi?id=929082
- https://bugzilla.redhat.com/show_bug.cgi?id=929082
- oval:org.mitre.oval:def:18973
- oval:org.mitre.oval:def:18973
Modified: 2024-11-21
CVE-2013-1847
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0932
- openSUSE-SU-2013:0932
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- RHSA-2013:0737
- RHSA-2013:0737
- http://subversion.apache.org/security/CVE-2013-1847-advisory.txt
- http://subversion.apache.org/security/CVE-2013-1847-advisory.txt
- MDVSA-2013:153
- MDVSA-2013:153
- USN-1893-1
- USN-1893-1
- https://bugzilla.redhat.com/show_bug.cgi?id=929090
- https://bugzilla.redhat.com/show_bug.cgi?id=929090
- oval:org.mitre.oval:def:18538
- oval:org.mitre.oval:def:18538
Modified: 2024-11-21
CVE-2013-1849
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0687
- openSUSE-SU-2013:0932
- openSUSE-SU-2013:0932
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Apache Subversion 1.7.9 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- [subversion-announce] 20130404 Subversion 1.6.21 released
- RHSA-2013:0737
- RHSA-2013:0737
- 20130305 Apache Subversion mod_dav_svn DoS via MKACTIVITY/PROPFIND
- 20130305 Apache Subversion mod_dav_svn DoS via MKACTIVITY/PROPFIND
- http://subversion.apache.org/security/CVE-2013-1849-advisory.txt
- http://subversion.apache.org/security/CVE-2013-1849-advisory.txt
- MDVSA-2013:153
- MDVSA-2013:153
- USN-1893-1
- USN-1893-1
- https://bugzilla.redhat.com/show_bug.cgi?id=929093
- https://bugzilla.redhat.com/show_bug.cgi?id=929093
- oval:org.mitre.oval:def:18980
- oval:org.mitre.oval:def:18980
Modified: 2024-11-21
CVE-2013-1968
Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
- openSUSE-SU-2013:1139
- openSUSE-SU-2013:1139
- [subversion-announce] 20130531 Apache Subversion 1.7.10 released
- [subversion-announce] 20130531 Apache Subversion 1.7.10 released
- [subversion-announce] 20130531 Subversion 1.6.23 released
- [subversion-announce] 20130531 Subversion 1.6.23 released
- RHSA-2014:0255
- RHSA-2014:0255
- DSA-2703
- DSA-2703
- USN-1893-1
- USN-1893-1
- oval:org.mitre.oval:def:18986
- oval:org.mitre.oval:def:18986
- https://subversion.apache.org/security/CVE-2013-1968-advisory.txt
- https://subversion.apache.org/security/CVE-2013-1968-advisory.txt
Modified: 2024-11-21
CVE-2013-2112
The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
- openSUSE-SU-2013:1139
- openSUSE-SU-2013:1139
- [subversion-announce] 20130531 Apache Subversion 1.7.10 released
- [subversion-announce] 20130531 Apache Subversion 1.7.10 released
- [subversion-announce] 20130531 Subversion 1.6.23 released
- [subversion-announce] 20130531 Subversion 1.6.23 released
- RHSA-2014:0255
- RHSA-2014:0255
- DSA-2703
- DSA-2703
- USN-1893-1
- USN-1893-1
- oval:org.mitre.oval:def:19057
- oval:org.mitre.oval:def:19057
- https://subversion.apache.org/security/CVE-2013-2112-advisory.txt
- https://subversion.apache.org/security/CVE-2013-2112-advisory.txt
Modified: 2024-11-21
CVE-2013-4131
The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
- openSUSE-SU-2013:1286
- openSUSE-SU-2013:1286
- http://subversion.apache.org/security/CVE-2013-4131-advisory.txt
- http://subversion.apache.org/security/CVE-2013-4131-advisory.txt
- 61454
- 61454
- https://bugzilla.redhat.com/show_bug.cgi?id=986194
- https://bugzilla.redhat.com/show_bug.cgi?id=986194
- apache-subversion-cve20134131-dos(85983)
- apache-subversion-cve20134131-dos(85983)
- oval:org.mitre.oval:def:18621
- oval:org.mitre.oval:def:18621
Modified: 2024-11-21
CVE-2013-4277
Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
- openSUSE-SU-2013:1442
- openSUSE-SU-2013:1442
- openSUSE-SU-2013:1485
- openSUSE-SU-2013:1485
- http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
- http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
- 62266
- 62266
- apache-subversion-cve20134277-symlink(86972)
- apache-subversion-cve20134277-symlink(86972)
- oval:org.mitre.oval:def:18554
- oval:org.mitre.oval:def:18554
Modified: 2024-11-21
CVE-2014-0032
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
- openSUSE-SU-2014:0307
- openSUSE-SU-2014:0307
- openSUSE-SU-2014:0334
- openSUSE-SU-2014:0334
- [subversion-dev] 20140110 2 Re: Segfault in mod_dav_svn with repositories on /
- [subversion-dev] 20140110 2 Re: Segfault in mod_dav_svn with repositories on /
- [subversion-dev] 20140110 Re: Segfault in mod_dav_svn with repositories on /
- [subversion-dev] 20140110 Re: Segfault in mod_dav_svn with repositories on /
- [subversion-dev] 20140110 Sin mod_dav_svn with repositories on /
- [subversion-dev] 20140110 Sin mod_dav_svn with repositories on /
- RHSA-2014:0255
- RHSA-2014:0255
- 56822
- 56822
- 60722
- 60722
- 61321
- 61321
- http://support.apple.com/kb/HT6444
- http://support.apple.com/kb/HT6444
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 102927
- 102927
- 65434
- 65434
- USN-2316-1
- USN-2316-1
- apache-subversion-cve20140032-dos(90986)
- apache-subversion-cve20140032-dos(90986)
- GLSA-201610-05
- GLSA-201610-05
Modified: 2024-11-21
CVE-2014-3504
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
- openSUSE-SU-2014:1059
- openSUSE-SU-2014:1059
- 59584
- 59584
- 60721
- 60721
- USN-2315-1
- USN-2315-1
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 69238
- 69238
- https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc
- https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc
- GLSA-201610-05
- GLSA-201610-05
- https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
- https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
Modified: 2024-11-21
CVE-2014-3522
The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
- APPLE-SA-2015-03-09-4
- APPLE-SA-2015-03-09-4
- openSUSE-SU-2014:1059
- openSUSE-SU-2014:1059
- 59432
- 59432
- 59584
- 59584
- 60100
- 60100
- 60722
- 60722
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 109996
- 109996
- 69237
- 69237
- USN-2316-1
- USN-2316-1
- apache-subversion-cve20143528-info-disc(95090)
- apache-subversion-cve20143528-info-disc(95090)
- apache-subversion-cve20143522-spoofing(95311)
- apache-subversion-cve20143522-spoofing(95311)
- GLSA-201610-05
- GLSA-201610-05
- https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
- https://subversion.apache.org/security/CVE-2014-3522-advisory.txt
- https://support.apple.com/HT204427
- https://support.apple.com/HT204427
Modified: 2024-11-21
CVE-2014-3528
Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
- APPLE-SA-2015-03-09-4
- APPLE-SA-2015-03-09-4
- openSUSE-SU-2014:1059
- openSUSE-SU-2014:1059
- RHSA-2015:0165
- RHSA-2015:0165
- RHSA-2015:0166
- RHSA-2015:0166
- 59432
- 59432
- 59584
- 59584
- 60722
- 60722
- http://subversion.apache.org/security/CVE-2014-3528-advisory.txt
- http://subversion.apache.org/security/CVE-2014-3528-advisory.txt
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 68995
- 68995
- USN-2316-1
- USN-2316-1
- GLSA-201610-05
- GLSA-201610-05
- https://support.apple.com/HT204427
- https://support.apple.com/HT204427
Modified: 2024-11-21
CVE-2014-3580
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
- APPLE-SA-2015-03-09-4
- APPLE-SA-2015-03-09-4
- RHSA-2015:0165
- RHSA-2015:0165
- RHSA-2015:0166
- RHSA-2015:0166
- 61131
- 61131
- http://subversion.apache.org/security/CVE-2014-3580-advisory.txt
- http://subversion.apache.org/security/CVE-2014-3580-advisory.txt
- DSA-3107
- DSA-3107
- 71726
- 71726
- USN-2721-1
- USN-2721-1
- https://support.apple.com/HT204427
- https://support.apple.com/HT204427
Modified: 2024-11-21
CVE-2014-8108
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
- APPLE-SA-2015-03-09-4
- APPLE-SA-2015-03-09-4
- RHSA-2015:0166
- RHSA-2015:0166
- 61131
- 61131
- http://subversion.apache.org/security/CVE-2014-8108-advisory.txt
- http://subversion.apache.org/security/CVE-2014-8108-advisory.txt
- 71725
- 71725
- USN-2721-1
- USN-2721-1
- https://support.apple.com/HT204427
- https://support.apple.com/HT204427
Modified: 2024-11-21
CVE-2015-0248
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
- APPLE-SA-2015-09-16-2
- APPLE-SA-2015-09-16-2
- openSUSE-SU-2015:0672
- openSUSE-SU-2015:0672
- RHSA-2015:1633
- RHSA-2015:1633
- RHSA-2015:1742
- RHSA-2015:1742
- http://subversion.apache.org/security/CVE-2015-0248-advisory.txt
- http://subversion.apache.org/security/CVE-2015-0248-advisory.txt
- DSA-3231
- DSA-3231
- MDVSA-2015:192
- MDVSA-2015:192
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 74260
- 74260
- 1033214
- 1033214
- USN-2721-1
- USN-2721-1
- GLSA-201610-05
- GLSA-201610-05
- https://support.apple.com/HT205217
- https://support.apple.com/HT205217
Modified: 2024-11-21
CVE-2015-0251
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
- APPLE-SA-2015-09-16-2
- APPLE-SA-2015-09-16-2
- openSUSE-SU-2015:0672
- openSUSE-SU-2015:0672
- RHSA-2015:1633
- RHSA-2015:1633
- RHSA-2015:1742
- RHSA-2015:1742
- 20150611 Apache vulnerability program faulting module ntdll.dll
- 20150611 Apache vulnerability program faulting module ntdll.dll
- http://subversion.apache.org/security/CVE-2015-0251-advisory.txt
- http://subversion.apache.org/security/CVE-2015-0251-advisory.txt
- DSA-3231
- DSA-3231
- MDVSA-2015:192
- MDVSA-2015:192
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 74259
- 74259
- 1033214
- 1033214
- USN-2721-1
- USN-2721-1
- GLSA-201610-05
- GLSA-201610-05
- https://support.apple.com/HT205217
- https://support.apple.com/HT205217
Closed bugs
FR: новая версия 1.8.*
Closed vulnerabilities
BDU:2015-09733
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2012-2942
Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
- http://haproxy.1wt.eu/#news
- http://haproxy.1wt.eu/#news
- http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
- http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
- http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
- http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
- 49261
- 49261
- GLSA-201301-02
- GLSA-201301-02
- DSA-2711
- DSA-2711
- [oss-security] 20120523 CVE request: haproxy trash buffer overflow flaw
- [oss-security] 20120523 CVE request: haproxy trash buffer overflow flaw
- [oss-security] 20120523 Re: CVE request: haproxy trash buffer overflow flaw
- [oss-security] 20120523 Re: CVE request: haproxy trash buffer overflow flaw
- [oss-security] 20120528 Duplicate CVE identifiers (CVE-2012-2391 and CVE-2012-2942) assigned to HAProxy issue
- [oss-security] 20120528 Duplicate CVE identifiers (CVE-2012-2391 and CVE-2012-2942) assigned to HAProxy issue
- 53647
- 53647
- USN-1800-1
- USN-1800-1
- haproxy-trash-bo(75777)
- haproxy-trash-bo(75777)
Modified: 2024-11-21
CVE-2013-1912
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
- FEDORA-2013-4807
- FEDORA-2013-4807
- FEDORA-2013-4827
- FEDORA-2013-4827
- FEDORA-2013-6253
- FEDORA-2013-6253
- RHSA-2013:0729
- RHSA-2013:0729
- RHSA-2013:0868
- RHSA-2013:0868
- 52725
- 52725
- DSA-2711
- DSA-2711
- [oss-security] 20130403 CVE-2013-1912 : haproxy may crash on TCP content inspection rules
- [oss-security] 20130403 CVE-2013-1912 : haproxy may crash on TCP content inspection rules
- 58820
- 58820
- USN-1800-1
- USN-1800-1
Modified: 2024-11-21
CVE-2013-2175
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
- [haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)
- [haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)
- RHSA-2013:1120
- RHSA-2013:1120
- RHSA-2013:1204
- RHSA-2013:1204
- 54344
- 54344
- DSA-2711
- DSA-2711
- USN-1889-1
- USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
- https://bugzilla.redhat.com/show_bug.cgi?id=974259