CVE-2016-8734

Priority
Description
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through
1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service
attack caused by exponential XML entity expansion. The attack can cause the
targeted process to consume an excessive amount of CPU resources or memory.
Ubuntu-Description
Florian Weimer discovered that Subversion clients did not properly
restrict XML entity expansion when accessing http(s):// URLs. A remote
attacker could use this to cause a denial of service.
Notes
mdeslaurfor mod_dontdothat, we don't ship it in binary packages
for clients, we build with serf, so we're vulnerable
Package
Upstream:released (1.9.5-1, 1.8.17, 1.9.5)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [1.8.8-1ubuntu3.3])
Ubuntu 16.04 LTS (Xenial Xerus):released (1.9.3-2ubuntu1.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.9.5-1ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.9.5-1ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.9.5-1ubuntu1)
Patches:
Upstream:https://subversion.apache.org/security/CVE-2016-8734-advisory.txt
More Information

Updated: 2020-04-24 03:34:04 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)