{"schema_version":"1.7.2","id":"OESA-2021-1129","modified":"2021-04-07T11:02:47Z","published":"2021-04-07T11:02:47Z","upstream":["CVE-2020-10650"],"summary":"subversion security update","details":"Subversion exists to be universally recognized and adopted as an open-source, centralized version control system characterized by its reliability as a safe haven for valuable data; the simplicity of its model and usage; and its ability to support the needs of a wide variety of users and projects, from individuals to large-scale enterprise operations.\r\n\r\nSecurity Fix(es):\r\n\r\nA null-pointer-dereference flaw was found in mod_authz_svn of subversion. This flaw allows a remote, unauthenticated attacker to cause a denial of service in some server configurations. The highest threat from this vulnerability is to system availability.(CVE-2020-10650)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS","name":"subversion","purl":"pkg:rpm/openEuler/subversion\u0026distro=openEuler-20.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.2-3.oe1"}]}],"ecosystem_specific":{"aarch64":["ruby-subversion-1.12.2-3.oe1.aarch64.rpm","perl-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-1.12.2-3.oe1.aarch64.rpm","python2-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-debugsource-1.12.2-3.oe1.aarch64.rpm","subversion-devel-1.12.2-3.oe1.aarch64.rpm","subversion-debuginfo-1.12.2-3.oe1.aarch64.rpm","perl-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-devel-1.12.2-3.oe1.aarch64.rpm","ruby-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-debugsource-1.12.2-3.oe1.aarch64.rpm","subversion-debuginfo-1.12.2-3.oe1.aarch64.rpm","python2-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-1.12.2-3.oe1.aarch64.rpm"],"noarch":["subversion-help-1.12.2-3.oe1.noarch.rpm","subversion-help-1.12.2-3.oe1.noarch.rpm"],"src":["subversion-1.12.2-3.oe1.src.rpm","subversion-1.12.2-3.oe1.src.rpm"],"x86_64":["ruby-subversion-1.12.2-3.oe1.x86_64.rpm","python2-subversion-1.12.2-3.oe1.x86_64.rpm","perl-subversion-1.12.2-3.oe1.x86_64.rpm","subversion-debugsource-1.12.2-3.oe1.x86_64.rpm","subversion-devel-1.12.2-3.oe1.x86_64.rpm","subversion-1.12.2-3.oe1.x86_64.rpm","subversion-debuginfo-1.12.2-3.oe1.x86_64.rpm","subversion-debugsource-1.12.2-3.oe1.x86_64.rpm","ruby-subversion-1.12.2-3.oe1.x86_64.rpm","python2-subversion-1.12.2-3.oe1.x86_64.rpm","subversion-1.12.2-3.oe1.x86_64.rpm","subversion-devel-1.12.2-3.oe1.x86_64.rpm","subversion-debuginfo-1.12.2-3.oe1.x86_64.rpm","perl-subversion-1.12.2-3.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"subversion","purl":"pkg:rpm/openEuler/subversion\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.2-3.oe1"}]}],"ecosystem_specific":{"aarch64":["perl-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-devel-1.12.2-3.oe1.aarch64.rpm","ruby-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-debugsource-1.12.2-3.oe1.aarch64.rpm","subversion-debuginfo-1.12.2-3.oe1.aarch64.rpm","python2-subversion-1.12.2-3.oe1.aarch64.rpm","subversion-1.12.2-3.oe1.aarch64.rpm"],"noarch":["subversion-help-1.12.2-3.oe1.noarch.rpm"],"src":["subversion-1.12.2-3.oe1.src.rpm"],"x86_64":["subversion-debugsource-1.12.2-3.oe1.x86_64.rpm","ruby-subversion-1.12.2-3.oe1.x86_64.rpm","python2-subversion-1.12.2-3.oe1.x86_64.rpm","subversion-1.12.2-3.oe1.x86_64.rpm","subversion-devel-1.12.2-3.oe1.x86_64.rpm","subversion-debuginfo-1.12.2-3.oe1.x86_64.rpm","perl-subversion-1.12.2-3.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1129"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10650"}],"database_specific":{"severity":"High"}}