Improper Input Validation Affecting subversion:1.10/utf8proc package, versions <0:2.1.1-5.module_el8.3.0+2053+ac338b6d


Severity

Recommended
0.0
medium
0
10

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALMALINUX8-SUBVERSION-5620380
  • published28 May 2023
  • disclosed3 Nov 2020

Introduced: 3 Nov 2020

CVE-2018-11782  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:8 subversion:1.10/utf8proc to version 0:2.1.1-5.module_el8.3.0+2053+ac338b6d or higher.
This issue was patched in ALSA-2020:4712.

NVD Description

Note: Versions mentioned in the description apply only to the upstream subversion:1.10/utf8proc package and not the subversion:1.10/utf8proc package as distributed by AlmaLinux. See How to fix? for AlmaLinux:8 relevant fixed versions and status.

In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.

CVSS Base Scores

version 3.1