Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2905 subversion security update 2 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: subversion Publisher: Debian Operating System: Debian GNU/Linux 9 Debian GNU/Linux 10 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-0203 CVE-2018-11782 Reference: ESB-2019.2883 ESB-2019.2877 ESB-2019.2872 Original Bulletin: http://www.debian.org/security/2019/dsa-4490 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4490-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 01, 2019 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : subversion CVE ID : CVE-2018-11782 CVE-2019-0203 Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-11782 Ace Olszowka reported that the Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer, leading to a denial of service. CVE-2019-0203 Tomas Bortoli reported that the Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. If the server is configured with anonymous access enabled this could lead to a remote unauthenticated denial of service. For the oldstable distribution (stretch), these problems have been fixed in version 1.9.5-1+deb9u4. For the stable distribution (buster), these problems have been fixed in version 1.10.4-1+deb10u1. We recommend that you upgrade your subversion packages. For the detailed security status of subversion please refer to its security tracker page at: https://security-tracker.debian.org/tracker/subversion Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl1CEOZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Tn+xAAlXGJ2vZLwXuT+2SABhqLKTdSDEqCAwKLvHVB6LFHXFIu+WUdT8VSd6j3 lqSWzpOH4s6kmIz/yEiCWkYJmEc0hMHyPhljN+gbzpEQ3cPKyxJh9KekMEK23EpY 4DhKU+uDTCFKmsrfzcgIy8B5Bgw2H41w+MrQSonakfW7OtuVPD2s42VNd9O+JjY/ 3G4GG+Udg/Sewndc2dxa8hOO2wFEWVks5g0Nt/soRwMEACQLmKeS6PwFb4PDljr8 H5fHcbQjN2UxpRKAyq2E2azSXHpUDz6psRMwfAQYs8lhx9Ozt538QaX6A6a63vLx dtw2NVjg7Q12XDZY0Yt8V0h6oLEURLO8L1JOJeMkRiEVy6qPKQ4BLZ327uxkT4qP La8Wk5A4Y/pr72L2WD36Y8cSWS3JFFgaFpM0kXzkfOfTClTHWamBehOnD7pslqly ZvCmBavoslJ6uM8c/eLE6B8yaF13akqRIBeA2biaSHDEmf3mtpkDHNIGmZIMFNeE x/Lx8PbQCq/eQ060ioEJZV4xF9nKFrDTuUs6YTaWAfHtR5bo+/5uzGVgSA7B5KU+ XZjxGnlSITMbcqwvawg9toLAyL71kenR6GdYrRculLsKtVDI+1FtCFisqPwEacUx CaS3b0Bd8xyxbXnV0D+E/UaReS1x4i8lOSGOjj40d6b6Vv1X8Nw= =IVo1 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXUPjQWaOgq3Tt24GAQhm5BAAjpAwUhOvWRs1//vL6ttMggXtSQTlc/8Y aoOkMweYdkO7IhxjnfEarx3badLSia18lgc0yL5Xd64vsGH2ptnPUVqUoSIzGvCB zLu4lbtmd+4yX7tHaJkTwUo3uCfnqGZuJJZp6caEBBYQIh2kZPZs4ZhmzdbpDBZo a7xysUgirtTA1VXI3yf0zVEJLFd8Ru0purrWIYvvM+kbt8/NUygoVr7sW6gXr1Hf KFRIAZm1Px1/qX8qs1006yKT3/anuuxt2grVmJW+aIGBT5P/JV5INb+/C4bcT5FN 9uKQE16QKYhnjnWw4S2psxi3bqJb9tvW+1jUYstpdTu6+XwmoLVjbcXj82rNCVw9 HkhbJHauAt/H5Y9ty66rUVNahYkFhuSoCx5pb+YLtaEQrBLvvDRaXQkhsGleSUdy 1ONgYFyc5pEsP6f5HcStf/IxTU+EWg+5BsSbT2lEdCzKMKaO7dKrgL6cCGfu5VZi BSGBVL4wggbED2ogY2IrImEn6WZa4hjXNBxRc0h/72tKwYRynS4b2/YhFFe0jTOy 9O1g4ugKiIoSMxz6PobNJgdC88SOcb3/vQ3h3bxpnyKpBNZlo/42JLOnmK2Cw0j1 vfCP6RYYbksV4W/mGAdA4B/u1QYh/6sm5IrLOy+IcyehOdQ3TQgIiyxQ6TYo0lam hTHsvCX79ho= =fuh/ -----END PGP SIGNATURE-----