Fixed vulnerabilities:
- CVE-2014-3580 (VulnLIB link) A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn.
- CVE-2014-3528 (VulnLIB link) It was discovered that Subversion clients retrieved cached authentication credentials using the MD5 hash of the server realm string without also checking the server's URL. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm.
- CVE-2014-8108 (VulnLIB link) A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled certain requests for URIs that trigger a lookup of a virtual transaction name. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash.
Affected releases:
- Red Hat Enterprise Linux Desktop (v. 7)
- Red Hat Enterprise Linux HPC Node (v. 7)
- Red Hat Enterprise Linux Server (v. 7)
- Red Hat Enterprise Linux Workstation (v. 7)
Software description:
- subversion
Solution:
- Check VulnLIB for fixes for CVEs listed above and the source.
Source:
Wednesday, 11.02.2015