CVE-2016-8734

Priority
Description
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through
1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service
attack caused by exponential XML entity expansion. The attack can cause the
targeted process to consume an excessive amount of CPU resources or memory.
Ubuntu-Description
Florian Weimer discovered that Subversion clients did not properly
restrict XML entity expansion when accessing http(s):// URLs. A remote
attacker could use this to cause a denial of service.
Notes
 mdeslaur> for mod_dontdothat, we don't ship it in binary packages
 mdeslaur> for clients, we build with serf, so we're vulnerable
Package
Upstream:released (1.9.5-1, 1.8.17, 1.9.5)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Trusty/esm:DNE (trusty was released [1.8.8-1ubuntu3.3])
Ubuntu 16.04 LTS (Xenial Xerus):released (1.9.3-2ubuntu1.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.9.5-1ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.9.5-1ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.9.5-1ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (1.9.5-1ubuntu1)
Patches:
Upstream:https://subversion.apache.org/security/CVE-2016-8734-advisory.txt
More Information

Updated: 2019-04-26 14:18:13 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)