ArchLinux: 201908-10: subversion: denial of service

    Date24 Aug 2019
    CategoryArchLinux
    354
    Posted ByLinuxSecurity Advisories
    Archlinux Large
    The package subversion before version 1.12.2-1 is vulnerable to denial of service.
    Arch Linux Security Advisory ASA-201908-10
    ==========================================
    
    Severity: High
    Date    : 2019-08-16
    CVE-ID  : CVE-2018-11782 CVE-2019-0203
    Package : subversion
    Type    : denial of service
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1016
    
    Summary
    =======
    
    The package subversion before version 1.12.2-1 is vulnerable to denial
    of service.
    
    Resolution
    ==========
    
    Upgrade to 1.12.2-1.
    
    # pacman -Syu "subversion>=1.12.2-1"
    
    The problems have been fixed upstream in version 1.12.2.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2018-11782 (denial of service)
    
    Subversion svn:// connections, including svn+ssh:// and
    svn+://, use a custom network protocol [1] with Lisp-like
    syntax. The code implementing the protocol has dedicated codepaths for
    serialization of revision numbers into protocol integers.  A particular
    client query could cause the server to attempt to reply with a revision
    number whose value is the invalid revision number constant
    `SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the
    the serialization layer.
    
    - CVE-2019-0203 (denial of service)
    
    A null-pointer-dereference has been found in svnserve that results in a
    remote unauthenticated Denial-of-Service in some server configurations.
    The vulnerability can be triggered by an unauthenticated user if the
    server is configured with anonymous access enabled.
    
    Impact
    ======
    
    A remote attacker is able to cause a denial of service by sending a
    special packet.
    
    References
    ==========
    
    http://subversion.apache.org/security/CVE-2018-11782-advisory.txt
    http://subversion.apache.org/security/CVE-2019-0203-advisory.txt
    https://security.archlinux.org/CVE-2018-11782
    https://security.archlinux.org/CVE-2019-0203
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":51.32,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.47,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"26","type":"x","order":"3","pct":34.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.