Subject: [ASA-201908-10] subversion: denial of service Arch Linux Security Advisory ASA-201908-10 ========================================== Severity: High Date : 2019-08-16 CVE-ID : CVE-2018-11782 CVE-2019-0203 Package : subversion Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1016 Summary ======= The package subversion before version 1.12.2-1 is vulnerable to denial of service. Resolution ========== Upgrade to 1.12.2-1. # pacman -Syu "subversion>=1.12.2-1" The problems have been fixed upstream in version 1.12.2. Workaround ========== None. Description =========== - CVE-2018-11782 (denial of service) Subversion svn:// connections, including svn+ssh:// and svn+://, use a custom network protocol [1] with Lisp-like syntax. The code implementing the protocol has dedicated codepaths for serialization of revision numbers into protocol integers. A particular client query could cause the server to attempt to reply with a revision number whose value is the invalid revision number constant `SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the the serialization layer. - CVE-2019-0203 (denial of service) A null-pointer-dereference has been found in svnserve that results in a remote unauthenticated Denial-of-Service in some server configurations. The vulnerability can be triggered by an unauthenticated user if the server is configured with anonymous access enabled. Impact ====== A remote attacker is able to cause a denial of service by sending a special packet. References ========== http://subversion.apache.org/security/CVE-2018-11782-advisory.txt http://subversion.apache.org/security/CVE-2019-0203-advisory.txt https://security.archlinux.org/CVE-2018-11782 https://security.archlinux.org/CVE-2019-0203