Bug 1733088 (CVE-2018-11782)
Summary: | CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | msiddiqu |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bnater, jheger, jorton, security-response-team, vanmeeuwen+fedora |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | subversion 1.12.2, subversion 1.10.6, subversion 1.9.12 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-29 21:58:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1733447, 1733448, 1735578 | ||
Bug Blocks: | 1733096 |
Description
msiddiqu
2019-07-25 07:54:25 UTC
Statement: An authenticated user can cause subversion server (svnserve) process to crash by sending a well-formed read-only request which produces a particular answer. Exploitation results in denial of service by crashing an svnserve process. The impact of this differs depending on how svnserve is launched, including the different run modes selected by options such as "svnserve -d", "svnserve -T -d", "svnserve -t", and "svnserve -i". mod_dav_svn is not affected by this flaw. Created subversion tracking bugs for this issue: Affects: fedora-all [bug 1735578] External References: https://subversion.apache.org/security/CVE-2018-11782-advisory.txt Acknowledgments: Name: the Subversion project (Apache Software Foundation) Upstream: Ace Olszowka (Build Master at Computers Unlimited) This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3972 https://access.redhat.com/errata/RHSA-2020:3972 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-11782 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4712 https://access.redhat.com/errata/RHSA-2020:4712 |