Bug 1733088 (CVE-2018-11782)

Summary: CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bnater, jheger, jorton, security-response-team, vanmeeuwen+fedora
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: subversion 1.12.2, subversion 1.10.6, subversion 1.9.12 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-29 21:58:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1733447, 1733448, 1735578    
Bug Blocks: 1733096    

Description msiddiqu 2019-07-25 07:54:25 UTC
Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.

Subversion svn:// connections, including svn+ssh:// and svn+<custom>://, use a custom network protocol [1] with Lisp-like syntax.  The code implementing the protocol has dedicated codepaths for serialization of revision numbers into protocol integers.  A particular client query could cause the server to attempt to reply with a revision number whose value is the invalid revision number constant `SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the the serialization layer.

Reference:

1. https://svn.apache.org/repos/asf/subversion/tags/1.10.0/subversion/libsvn_ra_svn/protocol

Comment 4 Huzaifa S. Sidhpurwala 2019-07-26 06:20:51 UTC
Statement:

An authenticated user can cause subversion server (svnserve) process to crash by sending  a well-formed read-only request which produces a particular answer. Exploitation results in denial of service by crashing an svnserve process. The impact of this differs depending on how svnserve is launched, including the different run modes selected by options such as "svnserve -d", "svnserve -T -d", "svnserve -t", and "svnserve -i". mod_dav_svn is not affected by this flaw.

Comment 6 Marian Rehak 2019-08-01 06:16:45 UTC
Created subversion tracking bugs for this issue:

Affects: fedora-all [bug 1735578]

Comment 7 Huzaifa S. Sidhpurwala 2019-08-06 03:52:47 UTC
External References:

https://subversion.apache.org/security/CVE-2018-11782-advisory.txt

Comment 8 msiddiqu 2019-08-16 05:53:48 UTC
Acknowledgments:

Name: the Subversion project (Apache Software Foundation)
Upstream: Ace Olszowka (Build Master at Computers Unlimited)

Comment 15 errata-xmlrpc 2020-09-29 20:14:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:3972 https://access.redhat.com/errata/RHSA-2020:3972

Comment 16 Product Security DevOps Team 2020-09-29 21:58:18 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-11782

Comment 17 errata-xmlrpc 2020-11-04 03:13:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4712 https://access.redhat.com/errata/RHSA-2020:4712