Arch Linux Security Advisory ASA-201908-10
=========================================
Severity: High
Date    : 2019-08-16
CVE-ID  : CVE-2018-11782 CVE-2019-0203
Package : subversion
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1016

Summary
======
The package subversion before version 1.12.2-1 is vulnerable to denial
of service.

Resolution
=========
Upgrade to 1.12.2-1.

# pacman -Syu "subversion>=1.12.2-1"

The problems have been fixed upstream in version 1.12.2.

Workaround
=========
None.

Description
==========
- CVE-2018-11782 (denial of service)

Subversion svn:// connections, including svn+ssh:// and
svn+://, use a custom network protocol [1] with Lisp-like
syntax. The code implementing the protocol has dedicated codepaths for
serialization of revision numbers into protocol integers.  A particular
client query could cause the server to attempt to reply with a revision
number whose value is the invalid revision number constant
`SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the
the serialization layer.

- CVE-2019-0203 (denial of service)

A null-pointer-dereference has been found in svnserve that results in a
remote unauthenticated Denial-of-Service in some server configurations.
The vulnerability can be triggered by an unauthenticated user if the
server is configured with anonymous access enabled.

Impact
=====
A remote attacker is able to cause a denial of service by sending a
special packet.

References
=========
https://subversion.apache.org/security/CVE-2018-11782-advisory.txt
https://subversion.apache.org/security/CVE-2019-0203-advisory.txt
https://security.archlinux.org/CVE-2018-11782
https://security.archlinux.org/CVE-2019-0203

ArchLinux: 201908-10: subversion: denial of service

August 24, 2019

Summary

- CVE-2018-11782 (denial of service) Subversion svn:// connections, including svn+ssh:// and svn+://, use a custom network protocol [1] with Lisp-like syntax. The code implementing the protocol has dedicated codepaths for serialization of revision numbers into protocol integers. A particular client query could cause the server to attempt to reply with a revision number whose value is the invalid revision number constant `SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the the serialization layer.
- CVE-2019-0203 (denial of service)
A null-pointer-dereference has been found in svnserve that results in a remote unauthenticated Denial-of-Service in some server configurations. The vulnerability can be triggered by an unauthenticated user if the server is configured with anonymous access enabled.

Resolution

Upgrade to 1.12.2-1. # pacman -Syu "subversion>=1.12.2-1"
The problems have been fixed upstream in version 1.12.2.

References

https://subversion.apache.org/security/CVE-2018-11782-advisory.txt https://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://security.archlinux.org/CVE-2018-11782 https://security.archlinux.org/CVE-2019-0203

Severity
Package : subversion
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1016

Workaround

None.

Related News