GLSA 201610-05: Subversion, Serf: Multiple Vulnerabilities

Severity:normal
Title:Subversion, Serf: Multiple Vulnerabilities
Date:10/11/2016
Bugs: #500482, #518716, #519202, #545348, #556076, #567810, #581448, #586046
ID:201610-05

Synopsis

Multiple vulnerabilities have been found in Subversion and Serf, the worst of which could lead to execution of arbitrary code.

Background

Subversion is a version control system intended to eventually replace CVS. Like CVS, it has an optional client-server architecture (where the server can be an Apache server running mod_svn, or an ssh program as in CVS’s :ext: method). In addition to supporting the features found in CVS, Subversion also provides support for moving and copying files and directories.

The serf library is a high performance C-based HTTP client library built upon the Apache Portable Runtime (APR) library.

Affected packages

Package Vulnerable Unaffected Architecture(s)
dev-vcs/subversion < 1.9.4 >= 1.9.4 All supported architectures
net-libs/serf < 1.3.7 >= 1.3.7 All supported architectures

Description

Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition.

Workaround

There is no known workaround at this time.

Resolution

All Subversion users should upgrade to the latest version:

      # emerge --sync
      # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4"
    

All Serf users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201610-05.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!