CVE-2016-8734

NameCVE-2016-8734
DescriptionApache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
subversion (PTS)buster, buster (security)1.10.4-1+deb10u3fixed
bullseye (security), bullseye1.14.1-3+deb11u1fixed
bookworm1.14.2-4fixed
sid, trixie1.14.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
subversionsourcejessie1.8.10-6+deb8u5
subversionsource(unstable)1.9.5-1low

Notes

[wheezy] - subversion <no-dsa> (Minor issue, binary packages not affected since built against Neon as HTTP library)
Above wheezy entry workarounded; binary packages not affected (since in wheezy build against Neon as HTTP
library), though source is. (unimporant) for individual lines is not supported, thus workaround by marking
as no-dsa.
https://subversion.apache.org/security/CVE-2016-8734-advisory.txt

Search for package or bug name: Reporting problems