SuSE: 2004-018: subversion Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: subversion
Announcement-ID: SuSE-SA:2004:018
Date: Thursday, Jun 17th 2004 09:30 MEST
Affected products: 8.1, 8.2, 9.0, 9.1
Vulnerability Type: remote system compromise
Severity (1-10): 5
SUSE default package: no
Cross References: CAN-2004-0413
Content of this advisory:
1) security vulnerability resolved: heap overflow
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- icecast
- sitecopy
- cadaver
- OpenOffice_org
- tripwire
- postgresql
- lha
- XDM
- mod_proxy
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Subversion is a version control system like the well known CVS.
The subversion code is vulnerable to a remotely exploitable buffer
overflow on the heap. The bug appears before any authentication took
place. An attacker is able to execute arbitray code by abusing this
vulnerability.
There is no temporary workaround known.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
775edc02ae610d8062e808d37540c0ea
patch rpm(s):
93d2ddd82390857d7c2ed5793d2312eb
source rpm(s):
8498e3e8911260f8f06c285946f12437
SUSE Linux 9.0:
deeeef548aa11dfe1b176bf5a5af9d75
patch rpm(s):
38a6d786f0f0b42e68117a277b4db309
source rpm(s):
0c69c5a9665e75504d2c4bf8c51807a6
SUSE Linux 8.2:
1fbd241f1dfb9a95f4eb6fe224eb40bb
patch rpm(s):
b553edab8ea07dac53ad26d147dd029d
source rpm(s):
89d2b6eedbb67d8e3be5e1c7c334792f
SUSE Linux 8.1:
3e1d7172bc213bcdb7edc88b7653ab1b
patch rpm(s):
d4897a9197e3c8518a132a0d64cc41e5
source rpm(s):
3ebbd71afb51b6becb15f12e813d705a
x86-64 Platform:
SUSE Linux 9.1:
da1b75e7cf629b65f20b75295df216d8
patch rpm(s):
15ec6b033bc85e22b78b1638f13ffc9b
source rpm(s):
2b738a9a5e0aabcdee60d19b74371580
SUSE Linux 9.0:
af042607c6ad7e55c248f47177e8c166
patch rpm(s):
cbffe53ef02a36d63b71d2f86c17d861
source rpm(s):
d16a485c5d3983b2b4322405abe3c01a
______________________________________________________________________________
2) Pending vulnerabilities in SUSE Distributions and Workarounds:
- icecast
The icecast service is vulnerable to a remote denial-of-service
attack. Update packages will be available soon.
- sitecopy
The sitecopy package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- cadaver
The cadaver package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- OpenOffice_org
The OpenOffice_org package includes a vulnerable version
of the neon library (CAN-2004-0179, CAN-2004-0398). Update packages
will be available soon.
- tripwire
A format string bug in tripwire can be exploited locally
to gain root permissions. Update packages will be available soon.
- postgresql
A buffer overflow in psqlODBC could be exploited to crash the
application using it. E.g. a PHP script that uses ODBC to access a
PostgreSQL database can be utilized to crash the surrounding Apache
web-server. Other parts of PostgreSQL are not affected.
Update packages will be available soon.
- lha
Minor security fix for a buffer overflow while handling command
line options. This buffer overflow could be exploited in conjunction
with other mechanisms to gain higher privileges or access the system
remotely.
- XDM/XFree86
This update resolves random listening to ports by XDM
that allows to connect via the XDMCP. SUSE LINUX 9.1
is affected only.
New packages are currently being tested and will be
available soon.
- mod_proxy
A buffer overflow can be triggered by malicious remote
servers that return a negative Content-Length value.
This vulnerability can be used to execute commands remotely
New packages are currently being tested and will be
available soon.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References