Bug 1733088 (CVE-2018-11782) - CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'
Summary: CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-11782
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1733447 1733448 1735578
Blocks: 1733096
TreeView+ depends on / blocked
 
Reported: 2019-07-25 07:54 UTC by msiddiqu
Modified: 2021-02-16 21:36 UTC (History)
5 users (show)

Fixed In Version: subversion 1.12.2, subversion 1.10.6, subversion 1.9.12
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-09-29 21:58:18 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3972 0 None None None 2020-09-29 20:14:30 UTC
Red Hat Product Errata RHSA-2020:4712 0 None None None 2020-11-04 03:13:07 UTC

Description msiddiqu 2019-07-25 07:54:25 UTC
Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.

Subversion svn:// connections, including svn+ssh:// and svn+<custom>://, use a custom network protocol [1] with Lisp-like syntax.  The code implementing the protocol has dedicated codepaths for serialization of revision numbers into protocol integers.  A particular client query could cause the server to attempt to reply with a revision number whose value is the invalid revision number constant `SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the the serialization layer.

Reference:

1. https://svn.apache.org/repos/asf/subversion/tags/1.10.0/subversion/libsvn_ra_svn/protocol

Comment 4 Huzaifa S. Sidhpurwala 2019-07-26 06:20:51 UTC
Statement:

An authenticated user can cause subversion server (svnserve) process to crash by sending  a well-formed read-only request which produces a particular answer. Exploitation results in denial of service by crashing an svnserve process. The impact of this differs depending on how svnserve is launched, including the different run modes selected by options such as "svnserve -d", "svnserve -T -d", "svnserve -t", and "svnserve -i". mod_dav_svn is not affected by this flaw.

Comment 6 Marian Rehak 2019-08-01 06:16:45 UTC
Created subversion tracking bugs for this issue:

Affects: fedora-all [bug 1735578]

Comment 7 Huzaifa S. Sidhpurwala 2019-08-06 03:52:47 UTC
External References:

https://subversion.apache.org/security/CVE-2018-11782-advisory.txt

Comment 8 msiddiqu 2019-08-16 05:53:48 UTC
Acknowledgments:

Name: the Subversion project (Apache Software Foundation)
Upstream: Ace Olszowka (Build Master at Computers Unlimited)

Comment 15 errata-xmlrpc 2020-09-29 20:14:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:3972 https://access.redhat.com/errata/RHSA-2020:3972

Comment 16 Product Security DevOps Team 2020-09-29 21:58:18 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-11782

Comment 17 errata-xmlrpc 2020-11-04 03:13:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4712 https://access.redhat.com/errata/RHSA-2020:4712


Note You need to log in before you can comment on or make changes to this bug.