Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3143 subversion:1.10 security update 16 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: subversion Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-0203 Reference: ESB-2019.2877 ESB-2019.2872 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:2512 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: subversion:1.10 security update Advisory ID: RHSA-2019:2512-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2512 Issue date: 2019-08-15 CVE Names: CVE-2019-0203 ===================================================================== 1. Summary: An update for the subversion:1.10 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol. 5. Bugs fixed (https://bugzilla.redhat.com/): 1733073 - CVE-2019-0203 subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: libserf-1.3.9-9.module+el8.0.0+3900+919b6753.src.rpm subversion-1.10.2-2.module+el8.0.0+3900+919b6753.src.rpm utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753.src.rpm aarch64: libserf-1.3.9-9.module+el8.0.0+3900+919b6753.aarch64.rpm libserf-debuginfo-1.3.9-9.module+el8.0.0+3900+919b6753.aarch64.rpm libserf-debugsource-1.3.9-9.module+el8.0.0+3900+919b6753.aarch64.rpm mod_dav_svn-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm mod_dav_svn-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-debugsource-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-devel-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-devel-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-gnome-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-gnome-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-libs-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-libs-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-perl-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-perl-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-tools-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm subversion-tools-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.aarch64.rpm utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753.aarch64.rpm utf8proc-debuginfo-2.1.1-5.module+el8.0.0+3900+919b6753.aarch64.rpm utf8proc-debugsource-2.1.1-5.module+el8.0.0+3900+919b6753.aarch64.rpm noarch: subversion-javahl-1.10.2-2.module+el8.0.0+3900+919b6753.noarch.rpm ppc64le: libserf-1.3.9-9.module+el8.0.0+3900+919b6753.ppc64le.rpm libserf-debuginfo-1.3.9-9.module+el8.0.0+3900+919b6753.ppc64le.rpm libserf-debugsource-1.3.9-9.module+el8.0.0+3900+919b6753.ppc64le.rpm mod_dav_svn-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm mod_dav_svn-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-debugsource-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-devel-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-devel-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-gnome-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-gnome-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-libs-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-libs-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-perl-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-perl-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-tools-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm subversion-tools-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.ppc64le.rpm utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753.ppc64le.rpm utf8proc-debuginfo-2.1.1-5.module+el8.0.0+3900+919b6753.ppc64le.rpm utf8proc-debugsource-2.1.1-5.module+el8.0.0+3900+919b6753.ppc64le.rpm s390x: libserf-1.3.9-9.module+el8.0.0+3900+919b6753.s390x.rpm libserf-debuginfo-1.3.9-9.module+el8.0.0+3900+919b6753.s390x.rpm libserf-debugsource-1.3.9-9.module+el8.0.0+3900+919b6753.s390x.rpm mod_dav_svn-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm mod_dav_svn-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-debugsource-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-devel-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-devel-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-gnome-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-gnome-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-libs-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-libs-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-perl-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-perl-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-tools-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm subversion-tools-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.s390x.rpm utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753.s390x.rpm utf8proc-debuginfo-2.1.1-5.module+el8.0.0+3900+919b6753.s390x.rpm utf8proc-debugsource-2.1.1-5.module+el8.0.0+3900+919b6753.s390x.rpm x86_64: libserf-1.3.9-9.module+el8.0.0+3900+919b6753.x86_64.rpm libserf-debuginfo-1.3.9-9.module+el8.0.0+3900+919b6753.x86_64.rpm libserf-debugsource-1.3.9-9.module+el8.0.0+3900+919b6753.x86_64.rpm mod_dav_svn-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm mod_dav_svn-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-debugsource-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-devel-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-devel-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-gnome-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-gnome-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-libs-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-libs-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-perl-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-perl-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-tools-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm subversion-tools-debuginfo-1.10.2-2.module+el8.0.0+3900+919b6753.x86_64.rpm utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753.x86_64.rpm utf8proc-debuginfo-2.1.1-5.module+el8.0.0+3900+919b6753.x86_64.rpm utf8proc-debugsource-2.1.1-5.module+el8.0.0+3900+919b6753.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-0203 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXVWbEtzjgjWX9erEAQjUgw/+KumEL2gBaLshRu7Na7kq5PtCsD2UeKyk BEaYx0q3AVjzvr5zTdWHKh4H+pDwgooHDGL9bA1wAvnVlbjuXNf4eGMKSd6BFe05 9od/fQGT/+ahIy6V12hbiIJ2o70JdUlNAODX+jDqPvzjPc2pgwFD1l3Sl51q+vp7 49M5m0MQ4zetTE+uECbcZB/3zXs46gjLXVpxuxL2YEJthgMA4ZATerqik5pSV4dE yEFyA05Gg4aCF4C9HuUVN7BHtGZvDxid/I9Chks2c7w0WVX5bOWSsVGir3xT3iEn cKA3koBOLXNGn6RbSNQXwAyxghWDlV5bICGMDqmsJnlhzt9rmEd3DBPIsYAy4y5E wtKb7TtFGFM2cLKZzoqfjU9zRkaDWngxafGU+Y2VYKpEJUgmQhn3R4fa/d13XgJu NuIo7Dx2gYDEw2v/WfDhna3cLZhhpTZE9/QQ0yOkIDkUHA0k1LEq+YL+Kj+ejRUi +MQ8tTFhichxChJZ8LQg02LtGPjBQ/8qZlbYa5SKyziUlBJrmKoC1zEBN3gnFy5H IpL648gN5YqONP4Z6arx7KsaR9dupGNtIK9oR/gDzC+uozh53GxMN1KvARfyQneG 2oRZarLMArH0o1n6aGmDGTfjhMsML0nIYuocPj+jSD7FisvTZqDYTXGPvwgYxbCQ AoN/aMuSLB8= =mcwY - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXVX/VGaOgq3Tt24GAQinpBAAn+06sFA09GehUyP4XNB4B3QUKclB0Qvw jRq0QoWWLQwgVaLdEiJrikkBtdprZr/1HRrwfV2UpyyZJTpfSRg6FcGWkJk1XfrD Ye/PfNiTXfXt/5/elgOLArgsb6p037XbXsxtLsMrwH2ORBwyBs4gPpmceQxqLTmP k749ieCK01/00RHY5zU+Ybre+LafGUD6zDOBi0I7jaMQz4m50DMdIRHH/MCyskF0 R2dZCru6k1VS3ltXrmhbp7+aeT+BxkxzlOKxIzzfnXYHChEc6Iz7F4KwqbxzL2jf UJfDoIDJHGC9k/Pa2oBJOVuAeWPtFR6VgKQq963A21KAXuhr2Pk0EoQ89Wrc3kEY AchwD+dJp2xc2o5CFdfp73y3L++426+1MAoqMpJtVnUmYES31kuIeeh20iELHhPw ItSNtk/12GrJZcxFgMLZpg4XKM9+St/hcmBt0QADnGSH/vXQVdsdLJLGbFOTnfdb xpJXDQKCNYY1S9Uyq+g70LnRreBIMcL3FPYgu/M1fLZt07w/+l7NmQ/10sUR9JTq 27mnBt19iOJafKpTWvG07xGB8WrmIiZX+DrfpHRH4QrZvHitiOujCuU/PMt7DS3K 7mhTcq8MB7AhtExtnf4NL/pQOVILCuDe+5Rvh7g+ecCGMRlgwcyDd/csX26l3mLH 7PPRXV1LquY= =U2Ig -----END PGP SIGNATURE-----