A denial of service flaw was found in the way svnserve tool of Subversion, a concurrent version control system, managed remote client TCP connections that got closed early in the connection process (previously aborted connections were treated as critical errors, resulting into svnserve termination). A remote attacker could use this flaw to cause denial of service (svnserve daemon exit, leading to disruption of SVN service to other users). References: [1] http://subversion.apache.org/security/CVE-2013-2112-advisory.txt Annoucements: [2] http://mail-archives.apache.org/mod_mbox/subversion-dev/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8+xbHA5tocrrewWew@mail.gmail.com%3E (1.6.23) [3] http://mail-archives.apache.org/mod_mbox/subversion-dev/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw@mail.gmail.com%3E (1.7.10)
This issue affects the versions of the subversion package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the subversion package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created subversion tracking bugs for this issue Affects: fedora-all [bug 970044]
Upstream patches: http://svn.apache.org/viewvc?view=revision&revision=1482759 http://svn.apache.org/viewvc?view=revision&revision=1482779
Statement: This issue affects the version of subversion as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
subversion-1.7.11-1.fc18.1 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0255 https://rhn.redhat.com/errata/RHSA-2014-0255.html