Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3292 [DLA 1903-1] subversion security update 30 August 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: subversion Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-0203 CVE-2018-11782 Reference: ESB-2019.2877 ESB-2019.2872 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/08/msg00037.html - --------------------------BEGIN INCLUDED TEXT-------------------- Package : subversion Version : 1.8.10-6+deb8u7 CVE ID : CVE-2018-11782 CVE-2019-0203 Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-11782 Ace Olszowka reported that the Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer, leading to a denial of service. CVE-2019-0203 Tomas Bortoli reported that the Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. If the server is configured with anonymous access enabled this could lead to a remote unauthenticated denial of service. For Debian 8 "Jessie", these problems have been fixed in version 1.8.10-6+deb8u7. We recommend that you upgrade your subversion packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXWhggmaOgq3Tt24GAQhIqA//bnRHTD5VUhPFU6+hr7AR4085bp7QnAxW KxJe6N5GsPt8rUKLfz959Zo1yEt+klEdyFYChpm01j7HoFZheDLnTaS5p/G8P3hu N+jt2X82FzT2VmNZtGUsrESJoqRRbx1yvd/J2OOilJJHphPTpKZt+9O+N5gkCNHd 3bI6nySlhNvqLR/xXvqZh9iw50wdJq8DVOjCMmc7XYyQVMqkbQ5myN0bxse0DJQc k3HwhYVjWhmnLcv23+I3y1CphDgtMJLoNdtqSNW7K5xsvGbdFsGq2qCwn+pDv/ii ixQkYDbDfegWu6B407uc+dbYEPUXjDJHPZzXIZh/N8MZjpTqZpjbQNxa414Mrq1f TeDwk0xl4QDtelYWbXHPI9rbo+nUKNGCtpdR5lOf6W7+H7XQeXsRAd2gLt8k7g5Y pmffQUYfDcGj3ABJWiNNZVdw1CtGZn4OFRo92nRJLU5XbD2VWYIYmU62oNE+sk99 Y7Q+yHthwcqZfdiUkRhn4GqS9NgL5hAPuWZ3kazKvh9j59OrirxZwInPbHYWAOpo 3bSt5IqfJD69BGtPwBNB1VzJFwF2wIIgAckJX2X+RT43TYJRPawAi+sjorcREa/r RHFFyyXdbapZWsIgzjQqkp+66D+Ld6rsTEtqp01wZ6QoZBInaCrmLPu0iXWtFW4a 4a1b4kbDW+s= =3ouU -----END PGP SIGNATURE-----