Summary: | <dev-vcs/subversion-{1.8.18, 1.9.7}: Arbitrary code execution on clients through malicious svn+ssh URLs | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hanno Böck <hanno> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://subversion.apache.org/security/CVE-2017-9800-advisory.txt | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Hanno Böck
2017-08-10 19:24:52 UTC
commit 2a9da294f39199baec5a9eedd5ee368d62af42ec Author: Lars Wendler <polynomial-c@gentoo.org> Date: Fri Aug 11 14:16:43 2017 dev-vcs/subversion: Security bump to versions 1.8.18 and 1.9.7 Committed straight to stable. Package-Manager: Portage-2.3.6, Repoman-2.3.3 Thank you, Lars. @Security please add to an existing glsa or file a new one and add CVE. Gentoo Security Padawan ChrisADR This issue was resolved and addressed in GLSA 201709-09 at https://security.gentoo.org/glsa/201709-09 by GLSA coordinator Aaron Bauman (b-man). |