vulnerability
Red Hat: CVE-2018-11782: CVE-2018-11782 subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Sep 26, 2019 | Oct 1, 2020 | Aug 11, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Sep 26, 2019
Added
Oct 1, 2020
Modified
Aug 11, 2025
Description
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-libserfredhat-upgrade-libserf-debuginforedhat-upgrade-libserf-debugsourceredhat-upgrade-mod_dav_svnredhat-upgrade-mod_dav_svn-debuginforedhat-upgrade-subversionredhat-upgrade-subversion-debuginforedhat-upgrade-subversion-debugsourceredhat-upgrade-subversion-develredhat-upgrade-subversion-devel-debuginforedhat-upgrade-subversion-gnomeredhat-upgrade-subversion-gnome-debuginforedhat-upgrade-subversion-javahlredhat-upgrade-subversion-kderedhat-upgrade-subversion-libsredhat-upgrade-subversion-libs-debuginforedhat-upgrade-subversion-perlredhat-upgrade-subversion-perl-debuginforedhat-upgrade-subversion-pythonredhat-upgrade-subversion-rubyredhat-upgrade-subversion-toolsredhat-upgrade-subversion-tools-debuginforedhat-upgrade-utf8procredhat-upgrade-utf8proc-debuginforedhat-upgrade-utf8proc-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.