MGASA-2013-0175

Source
https://advisories.mageia.org/MGASA-2013-0175.html
Import Source
https://advisories.mageia.org/MGASA-2013-0175.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0175
Related
Published
2013-06-19T10:13:33Z
Modified
2022-01-22T02:45:17Z
Summary
Updated subversion packages fix security vulnerabilities
Details

Subversion repositories with the FSFS repository data store format can be corrupted by newline characters in filenames. A remote attacker with a malicious client could use this flaw to disrupt the service for other users using that repository (CVE-2013-1968).

Subversion's svnserve server process may exit when an incoming TCP connection is closed early in the connection process. A remote attacker can cause svnserve to exit and thus deny service to users of the server (CVE-2013-2112)

References
Credits

Affected packages

Mageia:3 / subversion

Package

Name
subversion
Purl
pkg:rpm/mageia/subversion?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.10-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:2 / subversion

Package

Name
subversion
Purl
pkg:rpm/mageia/subversion?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.10-1.mga2

Ecosystem specific

{
    "section": "core"
}