A security flaw was found in the way Subversion, a concurrent version control system, sanitized content of arguments passed to 'check-mime-type.pl' and 'svn-keyword-check.pl' hook scripts. A remote, authenticated attacker could provide a specially-crafted filename that if inspected by some of the aforementioned two scripts, would lead to arbitrary code execution with the privileges of the user running Subversion client. References: [1] http://subversion.apache.org/security/CVE-2013-2088-advisory.txt Announcement: [2] http://mail-archives.apache.org/mod_mbox/subversion-dev/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8+xbHA5tocrrewWew@mail.gmail.com%3E (1.6.23)
Created subversion tracking bugs for this issue Affects: fedora-all [bug 970043]
Upstream patch: http://svn.apache.org/viewvc?view=revision&revision=1485487
This security flaw exists in the 'check-mime-type.pl' and 'svn-keyword-check.pl' contrib scripts of subversion. The version of subversion shipped with Red Hat Enterprise Linux 5 and 6 does not ship these scripts.
Statement: Not Vulnerable. This issue does not affect the version of subversion as shipped with Red Hat Enterprise Linux 5 and 6.
This issue does not affect the version of subversion as shipped with Fedora 17 and Fedora 18.