Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2011-1783
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1783", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.5.0\", \"versionEndIncluding\": \"1.5.8\", \"matchCriteriaId\": \"B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6.0\", \"versionEndExcluding\": \"1.6.17\", \"matchCriteriaId\": \"EC997332-2E0B-4584-89E9-26BDADD2E817\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C757774-08E7-40AA-B532-6F705C8F7639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDE52846-24EC-4068-B788-EC7F915FFF11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9396E005-22D8-4342-9323-C7DEA379191D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.7.3\", \"matchCriteriaId\": \"22675032-282C-4F77-B590-46F3FAD615C3\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.\"}, {\"lang\": \"es\", \"value\": \"El m\\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\\u00f3n SVNPathAuthz short_circuit est\\u00e1 habilitada permite a atacantes remotos a causar una denegaci\\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\\u00f3n de datos en circunstancias oportunistas.\"}]", "id": "CVE-2011-1783", "lastModified": "2024-11-21T01:27:02.430", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-06-06T19:55:01.940", "references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44633\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44681\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44849\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44888\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45162\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT5130\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2251\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0862.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/48091\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1025618\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1144-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=709112\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44633\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44681\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44849\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/44888\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/45162\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT5130\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2011/dsa-2251\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0862.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/48091\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1025618\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1144-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=709112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-1783\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-06-06T19:55:01.940\",\"lastModified\":\"2024-11-21T01:27:02.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 habilitada permite a atacantes remotos a causar una denegaci\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\u00f3n de datos en circunstancias oportunistas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0\",\"versionEndIncluding\":\"1.5.8\",\"matchCriteriaId\":\"B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6.0\",\"versionEndExcluding\":\"1.6.17\",\"matchCriteriaId\":\"EC997332-2E0B-4584-89E9-26BDADD2E817\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE52846-24EC-4068-B788-EC7F915FFF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9396E005-22D8-4342-9323-C7DEA379191D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.7.3\",\"matchCriteriaId\":\"22675032-282C-4F77-B590-46F3FAD615C3\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44633\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44681\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44849\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45162\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2251\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0862.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48091\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025618\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1144-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=709112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2251\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0862.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48091\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1144-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=709112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
cve-2011-1783
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 | |
canonical | ubuntu_linux | 11.04 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
fedoraproject | fedora | 14 | |
fedoraproject | fedora | 15 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7", "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC997332-2E0B-4584-89E9-26BDADD2E817", "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "22675032-282C-4F77-B590-46F3FAD615C3", "versionEndExcluding": "10.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 habilitada permite a atacantes remotos a causar una denegaci\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\u00f3n de datos en circunstancias oportunistas." } ], "id": "CVE-2011-1783", "lastModified": "2024-11-21T01:27:02.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:01.940", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
RHSA-2011:0862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nAn infinite loop flaw was found in the way the mod_dav_svn module processed\ncertain data sets. If the SVNPathAuthz directive was set to\n\"short_circuit\", and path-based access control for files and directories\nwas enabled, a malicious, remote user could use this flaw to cause the\nhttpd process serving the request to consume an excessive amount of system\nmemory. (CVE-2011-1783)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed requests submitted against the URL of a baselined resource. A\nmalicious, remote user could use this flaw to cause the httpd process\nserving the request to crash. (CVE-2011-1752)\n\nAn information disclosure flaw was found in the way the mod_dav_svn\nmodule processed certain URLs when path-based access control for files and\ndirectories was enabled. A malicious, remote user could possibly use this\nflaw to access certain files in a repository that would otherwise not be\naccessible to them. Note: This vulnerability cannot be triggered if the\nSVNPathAuthz directive is set to \"short_circuit\". (CVE-2011-1921)\n\nRed Hat would like to thank the Apache Subversion project for reporting\nthese issues. Upstream acknowledges Joe Schaefer of the Apache Software\nFoundation as the original reporter of CVE-2011-1752; Ivan Zhakov of\nVisualSVN as the original reporter of CVE-2011-1783; and Kamesh\nJayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0862", "url": "https://access.redhat.com/errata/RHSA-2011:0862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "category": "external", "summary": "709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0862.json" } ], "title": "Red Hat Security Advisory: subversion security update", "tracking": { "current_release_date": "2024-11-22T04:23:46+00:00", "generator": { "date": "2024-11-22T04:23:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0862", "initial_release_date": "2011-06-08T15:41:00+00:00", "revision_history": [ { "date": "2011-06-08T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-08T11:47:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:23:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.src", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.src", "product_id": "subversion-0:1.6.11-2.el6_1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=src" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.src", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.src", "product_id": "subversion-0:1.6.11-7.el5_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_id": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-svn2cl@1.6.11-2.el6_1.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1752", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709111" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "RHBZ#709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] }, { "names": [ "Ivan Zhakov" ], "organization": "VisualSVN", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2011-1783", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709112" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "RHBZ#709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1783", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1921", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709114" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "RHBZ#709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users" } ] }
rhsa-2011_0862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nAn infinite loop flaw was found in the way the mod_dav_svn module processed\ncertain data sets. If the SVNPathAuthz directive was set to\n\"short_circuit\", and path-based access control for files and directories\nwas enabled, a malicious, remote user could use this flaw to cause the\nhttpd process serving the request to consume an excessive amount of system\nmemory. (CVE-2011-1783)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed requests submitted against the URL of a baselined resource. A\nmalicious, remote user could use this flaw to cause the httpd process\nserving the request to crash. (CVE-2011-1752)\n\nAn information disclosure flaw was found in the way the mod_dav_svn\nmodule processed certain URLs when path-based access control for files and\ndirectories was enabled. A malicious, remote user could possibly use this\nflaw to access certain files in a repository that would otherwise not be\naccessible to them. Note: This vulnerability cannot be triggered if the\nSVNPathAuthz directive is set to \"short_circuit\". (CVE-2011-1921)\n\nRed Hat would like to thank the Apache Subversion project for reporting\nthese issues. Upstream acknowledges Joe Schaefer of the Apache Software\nFoundation as the original reporter of CVE-2011-1752; Ivan Zhakov of\nVisualSVN as the original reporter of CVE-2011-1783; and Kamesh\nJayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0862", "url": "https://access.redhat.com/errata/RHSA-2011:0862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "category": "external", "summary": "709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0862.json" } ], "title": "Red Hat Security Advisory: subversion security update", "tracking": { "current_release_date": "2024-11-22T04:23:46+00:00", "generator": { "date": "2024-11-22T04:23:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0862", "initial_release_date": "2011-06-08T15:41:00+00:00", "revision_history": [ { "date": "2011-06-08T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-08T11:47:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:23:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.src", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.src", "product_id": "subversion-0:1.6.11-2.el6_1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=src" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.src", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.src", "product_id": "subversion-0:1.6.11-7.el5_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_id": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-svn2cl@1.6.11-2.el6_1.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1752", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709111" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "RHBZ#709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] }, { "names": [ "Ivan Zhakov" ], "organization": "VisualSVN", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2011-1783", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709112" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "RHBZ#709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1783", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1921", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709114" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "RHBZ#709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users" } ] }
rhsa-2011:0862
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nAn infinite loop flaw was found in the way the mod_dav_svn module processed\ncertain data sets. If the SVNPathAuthz directive was set to\n\"short_circuit\", and path-based access control for files and directories\nwas enabled, a malicious, remote user could use this flaw to cause the\nhttpd process serving the request to consume an excessive amount of system\nmemory. (CVE-2011-1783)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed requests submitted against the URL of a baselined resource. A\nmalicious, remote user could use this flaw to cause the httpd process\nserving the request to crash. (CVE-2011-1752)\n\nAn information disclosure flaw was found in the way the mod_dav_svn\nmodule processed certain URLs when path-based access control for files and\ndirectories was enabled. A malicious, remote user could possibly use this\nflaw to access certain files in a repository that would otherwise not be\naccessible to them. Note: This vulnerability cannot be triggered if the\nSVNPathAuthz directive is set to \"short_circuit\". (CVE-2011-1921)\n\nRed Hat would like to thank the Apache Subversion project for reporting\nthese issues. Upstream acknowledges Joe Schaefer of the Apache Software\nFoundation as the original reporter of CVE-2011-1752; Ivan Zhakov of\nVisualSVN as the original reporter of CVE-2011-1783; and Kamesh\nJayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0862", "url": "https://access.redhat.com/errata/RHSA-2011:0862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "category": "external", "summary": "709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0862.json" } ], "title": "Red Hat Security Advisory: subversion security update", "tracking": { "current_release_date": "2024-11-22T04:23:46+00:00", "generator": { "date": "2024-11-22T04:23:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0862", "initial_release_date": "2011-06-08T15:41:00+00:00", "revision_history": [ { "date": "2011-06-08T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-08T11:47:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:23:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.src", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.src", "product_id": "subversion-0:1.6.11-2.el6_1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=src" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.src", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.src", "product_id": "subversion-0:1.6.11-7.el5_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_id": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-svn2cl@1.6.11-2.el6_1.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1752", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709111" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "RHBZ#709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] }, { "names": [ "Ivan Zhakov" ], "organization": "VisualSVN", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2011-1783", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709112" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "RHBZ#709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1783", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1921", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709114" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "RHBZ#709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users" } ] }
var-201106-0192
Vulnerability from variot
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data. Apache Subversion is prone to multiple vulnerabilities, including two denial-of-service issues and an information-disclosure issue. Attackers can exploit these issues to crash the application, exhaust all memory resources, or obtain potentially sensitive information. Versions prior to Subversion 1.6.17 are vulnerable. The server is fast, reliable and extensible through a simple API.
The mod_dav_svn Apache HTTPD server module may in certain cenarios enter a logic loop which does not exit and which allocates emory in each iteration, ultimately exhausting all the available emory on the server which can lead to a DoS (Denial Of Service) (CVE-2011-1783).
The mod_dav_svn Apache HTTPD server module may leak to remote users the file contents of files configured to be unreadable by those users (CVE-2011-1921).
Packages for 2009.0 are provided as of the Extended Maintenance Program. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFN6cg2mqjQ0CJFipgRAqj2AKCRyKt813e0OmWSTU5bL58KCmUwowCfT6RY DDOtowgSctAg4EX+tLXIvRQ= =zsmM -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-02-01-1 OS X Lion v10.7.3 and Security Update 2012-001
OS X Lion v10.7.3 and Security Update 2012-001 is now available and addresses the following:
Address Book Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker in a privileged network position may intercept CardDAV data Description: Address Book supports Secure Sockets Layer (SSL) for accessing CardDAV. A downgrade issue caused Address Book to attempt an unencrypted connection if an encrypted connection failed. An attacker in a privileged network position could abuse this behavior to intercept CardDAV data. This issue is addressed by not downgrading to an unencrypted connection without user approval. CVE-ID CVE-2011-3444 : Bernard Desruisseaux of Oracle Corporation
Apache Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in Apache Description: Apache is updated to version 2.2.21 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/ CVE-ID CVE-2011-3348
Apache Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Apache disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by providing a configuration parameter to control the countermeasure and enabling it by default. CVE-ID CVE-2011-3389
CFNetwork Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. When accessing a maliciously crafted URL, CFNetwork could send the request to an incorrect origin server. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3246 : Erling Ellingsen of Facebook
CFNetwork Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. When accessing a maliciously crafted URL, CFNetwork could send unexpected request headers. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3447 : Erling Ellingsen of Facebook
ColorSync Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0200 : binaryproof working with TippingPoint's Zero Day Initiative
CoreAudio Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of AAC encoded audio streams. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-3252 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
CoreMedia Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreMedia's handling of H.264 encoded movie files. CVE-ID CVE-2011-3448 : Scott Stender of iSEC Partners
CoreText Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to an unexpected application termination or arbitrary code execution Description: A use after free issue existed in the handling of font files. CVE-ID CVE-2011-3449 : Will Dormann of the CERT/CC
CoreUI Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a malicious website may lead to an unexpected application termination or arbitrary code execution Description: An unbounded stack allocation issue existed in the handling of long URLs. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3450 : Ben Syverson
curl Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A remote server may be able to impersonate clients via GSSAPI requests Description: When doing GSSAPI authentication, libcurl unconditionally performs credential delegation. This issue is addressed by disabling GSSAPI credential delegation. CVE-ID CVE-2011-2192
Data Security Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: Two certificate authorities in the list of trusted root certificates have independently issued intermediate certificates to DigiCert Malaysia. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted. We would like to acknowledge Bruce Morton of Entrust, Inc. for reporting this issue.
dovecot Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Dovecot disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by enabling the countermeasure. CVE-ID CVE-2011-3389 : Apple
filecmds Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Decompressing a maliciously crafted compressed file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the 'uncompress' command line tool. CVE-ID CVE-2011-2895
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in ImageIO's handling of CCITT Group 4 encoded TIFF files. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of ThunderScan encoded TIFF images. This issue is address by updating libtiff to version 3.9.5. CVE-ID CVE-2011-1167
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in libpng 1.5.4 Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html CVE-ID CVE-2011-3328
Internet Sharing Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A Wi-Fi network created by Internet Sharing may lose security settings after a system update Description: After updating to a version of OS X Lion prior to 10.7.3, the Wi-Fi configuration used by Internet Sharing may revert to factory defaults, which disables the WEP password. This issue only affects systems with Internet Sharing enabled and sharing the connection to Wi-Fi. This issue is addressed by preserving the Wi-Fi configuration during a system update. CVE-ID CVE-2011-3452 : an anonymous researcher
Libinfo Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in Libinfo's handling of hostname lookup requests. Libinfo could return incorrect results for a maliciously crafted hostname. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3441 : Erling Ellingsen of Facebook
libresolv Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Applications that use OS X's libresolv library may be vulnerable to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the parsing of DNS resource records, which may lead to heap memory corruption. CVE-ID CVE-2011-3453 : Ilja van Sprundel of IOActive
libsecurity Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Some EV certificates may be trusted even if the corresponding root has been marked as untrusted Description: The certificate code trusted a root certificate to sign EV certificates if it was on the list of known EV issuers, even if the user had marked it as 'Never Trust' in Keychain. The root would not be trusted to sign non-EV certificates. CVE-ID CVE-2011-3422 : Alastair Houghton
OpenGL Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Applications that use OS X's OpenGL implementation may be vulnerable to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the handling of GLSL compilation. CVE-ID CVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and Marc Schoenefeld of the Red Hat Security Response Team
PHP Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in PHP 5.3.6 Description: PHP is updated to version 5.3.8 to address several vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2011-1148 CVE-2011-1657 CVE-2011-1938 CVE-2011-2202 CVE-2011-2483 CVE-2011-3182 CVE-2011-3189 CVE-2011-3267 CVE-2011-3268
PHP Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in FreeType's handling of Type 1 fonts. This issue is addressed by updating FreeType to version 2.4.7. Further information is available via the FreeType site at http://www.freetype.org/ CVE-ID CVE-2011-3256 : Apple
PHP Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in libpng 1.5.4 Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html CVE-ID CVE-2011-3328
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Opening a maliciously crafted MP4 encoded file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of MP4 encoded files. CVE-ID CVE-2011-3458 : Luigi Auriemma and pa_kt both working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of font tables embedded in QuickTime movie files. CVE-ID CVE-2011-3248 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An off by one buffer overflow existed in the handling of rdrf atoms in QuickTime movie files. CVE-ID CVE-2011-3459 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted JPEG2000 image file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 files. CVE-ID CVE-2011-3250 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PNG files. CVE-ID CVE-2011-3460 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of FLC encoded movie files CVE-ID CVE-2011-3249 : Matt 'j00ru' Jurczyk working with TippingPoint's Zero Day Initiative
SquirrelMail Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Multiple vulnerabilities in SquirrelMail Description: SquirrelMail is updated to version 1.4.22 to address several vulnerabilities, the most serious of which is a cross-site scripting issue. This issue does not affect OS X Lion systems. Further information is available via the SquirrelMail web site at http://www.SquirrelMail.org/ CVE-ID CVE-2010-1637 CVE-2010-2813 CVE-2010-4554 CVE-2010-4555 CVE-2011-2023
Subversion Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Accessing a Subversion repository may lead to the disclosure of sensitive information Description: Subversion is updated to version 1.6.17 to address multiple vulnerabilities, the most serious of which may lead to the disclosure of sensitive information. Further information is available via the Subversion web site at http://subversion.tigris.org/ CVE-ID CVE-2011-1752 CVE-2011-1783 CVE-2011-1921
Time Machine Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A remote attacker may access new backups created by the user's system Description: The user may designate a remote AFP volume or Time Capsule to be used for Time Machine backups. Time Machine did not verify that the same device was being used for subsequent backup operations. An attacker who is able to spoof the remote volume could gain access to new backups created by the user's system. This issue is addressed by verifying the unique identifier associated with a disk for backup operations. CVE-ID CVE-2011-3462 : Michael Roitzsch of the Technische Universitat Dresden
Tomcat Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Multiple vulnerabilities in Tomcat 6.0.32 Description: Tomcat is updated to version 6.0.33 to address multiple vulnerabilities, the most serious of which may lead to the disclosure of sensitive information. Tomcat is only provided on Mac OS X Server systems. This issue does not affect OS X Lion systems. Further information is available via the Tomcat site at http://tomcat.apache.org/ CVE-ID CVE-2011-2204
WebDAV Sharing Available for: OS X Lion Server v10.7 to v10.7.2 Impact: Local users may obtain system privileges Description: An issue existed in WebDAV Sharing's handling of user authentication. A user with a valid account on the server or one of its bound directories could cause the execution of arbitrary code with system privileges. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3463 : Gordon Davisson of Crywolf
Webmail Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted e-mail message may lead to the disclosure of message content Description: A cross-site scripting vulnerability existed in the handling of mail messages. This issue is addressed by updating Roundcube Webmail to version 0.6. This issue does not affect systems prior to OS X Lion. Further information is available via the Roundcube site at http://trac.roundcube.net/ CVE-ID CVE-2011-2937
X11 Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in FreeType's handling of Type 1 fonts. This issue is addressed by updating FreeType to version 2.4.7. Further information is available via the FreeType site at http://www.freetype.org/ CVE-ID CVE-2011-3256 : Apple
OS X Lion v10.7.3 and Security Update 2012-001 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2021-001 or OS X v10.7.3.
For OS X Lion v10.7.2 The download file is named: MacOSXUpd10.7.3.dmg Its SHA-1 digest is: 7102fe8f9f47286c45dfa35f6e84e7f730493a7c
For OS X Lion v10.7 and v10.7.1 The download file is named: MacOSXUpdCombo10.7.3.dmg Its SHA-1 digest is: 07dfce300f6801eb63d9ac13e0bec84e1862a16c
For OS X Lion Server v10.7.2 The download file is named: MacOSXServerUpd10.7.3.dmg Its SHA-1 digest is: 55a9571635d4ec088c142d68132d0d69fcb8867d
For OS X Lion Server v10.7 and v10.7.1 The download file is named: MacOSXServerUpdCombo10.7.3.dmg Its SHA-1 digest is: 2c87824f09734499ea166ea0617a3ac21ecf832b
For Mac OS X v10.6.8 The download file is named: SecUpd2012-001Snow.dmg Its SHA-1 digest is: 40875ee8cb609bbaefc8f421a9c34cc353db42b8
For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-001.dmg Its SHA-1 digest is: 53b3ca5548001a9920aeabed4a034c6e4657fe20
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJPKYxNAAoJEGnF2JsdZQeeLiIIAMLhH2ipDFrhCsw/n4VDeF1V P6jSkGXC9tBBVMvw1Xq4c2ok4SI34bDfMlURAVR+dde/h6nIZR24aLQVoDLjJuIp RrO2dm1nQeozLJSx2NbxhVh54BucJdKp4xS1GkDNxkqcdh04RE9hRURXdKagnfGy 9P8QQPOQmKAiWos/LYhCPDInMfrpVNvEVwP8MCDP15g6hylN4De/Oyt7ZshPshSf MnAFObfBTGX5KioVqTyfdlBkKUfdXHJux61QEFHn8eadX6+/6IuKbUvK9B0icc8E pvbjOxQatFRps0KNWeIsKQc5i6iQoJhocAiIy6Y6LCuZQuSXCImY2RWXkVYzbWo= =c1eU -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei. Read more: http://conference.first.org/
TITLE: Apache Subversion mod_dav_svn Two Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA44681
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44681/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44681
RELEASE DATE: 2011-06-02
DISCUSS ADVISORY: http://secunia.com/advisories/44681/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44681/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44681
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Apache Subversion, which can be exploited by malicious people to cause a DoS (Denial of Service).
PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor 2) The vendor credits Ivan Zhakov, VisualSVN.
ORIGINAL ADVISORY: http://subversion.apache.org/security/CVE-2011-1752-advisory.txt http://subversion.apache.org/security/CVE-2011-1783-advisory.txt http://subversion.apache.org/security/CVE-2011-1921-advisory.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-11
http://security.gentoo.org/
Severity: Low Title: Subversion: Multiple vulnerabilities Date: September 23, 2013 Bugs: #350166, #356741, #369065, #463728, #463860, #472202, #482166 ID: 201309-11
Synopsis
Multiple vulnerabilities have been found in Subversion, allowing attackers to cause a Denial of Service, escalate privileges, or obtain sensitive information.
Background
Subversion is a versioning system designed to be a replacement for CVS.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/subversion < 1.7.13 >= 1.7.13
Description
Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. A local attacker could escalate his privileges to the user running svnserve.
Workaround
There is no known workaround at this time.
Resolution
All Subversion users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.7.13"
References
[ 1 ] CVE-2010-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539 [ 2 ] CVE-2010-4644 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644 [ 3 ] CVE-2011-0715 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715 [ 4 ] CVE-2011-1752 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752 [ 5 ] CVE-2011-1783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783 [ 6 ] CVE-2011-1921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921 [ 7 ] CVE-2013-1845 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845 [ 8 ] CVE-2013-1846 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846 [ 9 ] CVE-2013-1847 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847 [ 10 ] CVE-2013-1849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849 [ 11 ] CVE-2013-1884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884 [ 12 ] CVE-2013-1968 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968 [ 13 ] CVE-2013-2088 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088 [ 14 ] CVE-2013-2112 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112 [ 15 ] CVE-2013-4131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131 [ 16 ] CVE-2013-4277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201309-11.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: subversion security update Advisory ID: RHSA-2011:0862-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0862.html Issue date: 2011-06-08 CVE Names: CVE-2011-1752 CVE-2011-1783 CVE-2011-1921 =====================================================================
- Summary:
Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64
- Description:
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP.
An infinite loop flaw was found in the way the mod_dav_svn module processed certain data sets. If the SVNPathAuthz directive was set to "short_circuit", and path-based access control for files and directories was enabled, a malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2011-1783)
A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed requests submitted against the URL of a baselined resource. A malicious, remote user could use this flaw to cause the httpd process serving the request to crash. (CVE-2011-1752)
An information disclosure flaw was found in the way the mod_dav_svn module processed certain URLs when path-based access control for files and directories was enabled. A malicious, remote user could possibly use this flaw to access certain files in a repository that would otherwise not be accessible to them. Note: This vulnerability cannot be triggered if the SVNPathAuthz directive is set to "short_circuit". Upstream acknowledges Joe Schaefer of the Apache Software Foundation as the original reporter of CVE-2011-1752; Ivan Zhakov of VisualSVN as the original reporter of CVE-2011-1783; and Kamesh Jayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.
All Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
709111 - CVE-2011-1752 subversion (mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources 709112 - CVE-2011-1783 subversion (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control 709114 - CVE-2011-1921 subversion (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users
- Package List:
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm
i386: mod_dav_svn-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-javahl-1.6.11-7.el5_6.4.i386.rpm subversion-perl-1.6.11-7.el5_6.4.i386.rpm subversion-ruby-1.6.11-7.el5_6.4.i386.rpm
x86_64: mod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.x86_64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.x86_64.rpm subversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm subversion-perl-1.6.11-7.el5_6.4.x86_64.rpm subversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm
i386: mod_dav_svn-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-javahl-1.6.11-7.el5_6.4.i386.rpm subversion-perl-1.6.11-7.el5_6.4.i386.rpm subversion-ruby-1.6.11-7.el5_6.4.i386.rpm
ia64: mod_dav_svn-1.6.11-7.el5_6.4.ia64.rpm subversion-1.6.11-7.el5_6.4.ia64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ia64.rpm subversion-devel-1.6.11-7.el5_6.4.ia64.rpm subversion-javahl-1.6.11-7.el5_6.4.ia64.rpm subversion-perl-1.6.11-7.el5_6.4.ia64.rpm subversion-ruby-1.6.11-7.el5_6.4.ia64.rpm
ppc: mod_dav_svn-1.6.11-7.el5_6.4.ppc.rpm subversion-1.6.11-7.el5_6.4.ppc.rpm subversion-1.6.11-7.el5_6.4.ppc64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ppc.rpm subversion-debuginfo-1.6.11-7.el5_6.4.ppc64.rpm subversion-devel-1.6.11-7.el5_6.4.ppc.rpm subversion-devel-1.6.11-7.el5_6.4.ppc64.rpm subversion-javahl-1.6.11-7.el5_6.4.ppc.rpm subversion-perl-1.6.11-7.el5_6.4.ppc.rpm subversion-ruby-1.6.11-7.el5_6.4.ppc.rpm
s390x: mod_dav_svn-1.6.11-7.el5_6.4.s390x.rpm subversion-1.6.11-7.el5_6.4.s390.rpm subversion-1.6.11-7.el5_6.4.s390x.rpm subversion-debuginfo-1.6.11-7.el5_6.4.s390.rpm subversion-debuginfo-1.6.11-7.el5_6.4.s390x.rpm subversion-devel-1.6.11-7.el5_6.4.s390.rpm subversion-devel-1.6.11-7.el5_6.4.s390x.rpm subversion-javahl-1.6.11-7.el5_6.4.s390x.rpm subversion-perl-1.6.11-7.el5_6.4.s390x.rpm subversion-ruby-1.6.11-7.el5_6.4.s390x.rpm
x86_64: mod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm subversion-1.6.11-7.el5_6.4.i386.rpm subversion-1.6.11-7.el5_6.4.x86_64.rpm subversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm subversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm subversion-devel-1.6.11-7.el5_6.4.i386.rpm subversion-devel-1.6.11-7.el5_6.4.x86_64.rpm subversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm subversion-perl-1.6.11-7.el5_6.4.x86_64.rpm subversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm
noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm
x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm
x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm
ppc64: mod_dav_svn-1.6.11-2.el6_1.4.ppc64.rpm subversion-1.6.11-2.el6_1.4.ppc.rpm subversion-1.6.11-2.el6_1.4.ppc64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm
s390x: mod_dav_svn-1.6.11-2.el6_1.4.s390x.rpm subversion-1.6.11-2.el6_1.4.s390.rpm subversion-1.6.11-2.el6_1.4.s390x.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm
x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
i386: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm
noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm
ppc64: subversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm subversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm subversion-devel-1.6.11-2.el6_1.4.ppc.rpm subversion-devel-1.6.11-2.el6_1.4.ppc64.rpm subversion-gnome-1.6.11-2.el6_1.4.ppc.rpm subversion-gnome-1.6.11-2.el6_1.4.ppc64.rpm subversion-javahl-1.6.11-2.el6_1.4.ppc.rpm subversion-javahl-1.6.11-2.el6_1.4.ppc64.rpm subversion-kde-1.6.11-2.el6_1.4.ppc.rpm subversion-kde-1.6.11-2.el6_1.4.ppc64.rpm subversion-perl-1.6.11-2.el6_1.4.ppc.rpm subversion-perl-1.6.11-2.el6_1.4.ppc64.rpm subversion-ruby-1.6.11-2.el6_1.4.ppc.rpm subversion-ruby-1.6.11-2.el6_1.4.ppc64.rpm
s390x: subversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm subversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm subversion-devel-1.6.11-2.el6_1.4.s390.rpm subversion-devel-1.6.11-2.el6_1.4.s390x.rpm subversion-gnome-1.6.11-2.el6_1.4.s390.rpm subversion-gnome-1.6.11-2.el6_1.4.s390x.rpm subversion-javahl-1.6.11-2.el6_1.4.s390.rpm subversion-javahl-1.6.11-2.el6_1.4.s390x.rpm subversion-kde-1.6.11-2.el6_1.4.s390.rpm subversion-kde-1.6.11-2.el6_1.4.s390x.rpm subversion-perl-1.6.11-2.el6_1.4.s390.rpm subversion-perl-1.6.11-2.el6_1.4.s390x.rpm subversion-ruby-1.6.11-2.el6_1.4.s390.rpm subversion-ruby-1.6.11-2.el6_1.4.s390x.rpm
x86_64: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
i386: mod_dav_svn-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm
x86_64: mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm subversion-1.6.11-2.el6_1.4.i686.rpm subversion-1.6.11-2.el6_1.4.x86_64.rpm subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-javahl-1.6.11-2.el6_1.4.i686.rpm subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm
i386: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm
noarch: subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm
x86_64: subversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm subversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm subversion-devel-1.6.11-2.el6_1.4.i686.rpm subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm subversion-gnome-1.6.11-2.el6_1.4.i686.rpm subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm subversion-kde-1.6.11-2.el6_1.4.i686.rpm subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm subversion-perl-1.6.11-2.el6_1.4.i686.rpm subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm subversion-ruby-1.6.11-2.el6_1.4.i686.rpm subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-1752.html https://www.redhat.com/security/data/cve/CVE-2011-1783.html https://www.redhat.com/security/data/cve/CVE-2011-1921.html https://access.redhat.com/security/updates/classification/#moderate http://subversion.apache.org/security/CVE-2011-1783-advisory.txt http://subversion.apache.org/security/CVE-2011-1752-advisory.txt http://subversion.apache.org/security/CVE-2011-1921-advisory.txt
- Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFN75utXlSAg2UNWIIRAuXgAJ9fhhY1xxC7jRZbLGZA6ENr3dnTBQCgkdf0 J9nA8MJRlM/XVtyj3mbVErg= =jujC -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2011-1752
The mod_dav_svn Apache HTTPD server module can be crashed though
when asked to deliver baselined WebDAV resources.
For the oldstable distribution (lenny), this problem has been fixed in version 1.5.1dfsg1-7.
For the stable distribution (squeeze), this problem has been fixed in version 1.6.12dfsg-6.
For the unstable distribution (sid), this problem has been fixed in version 1.6.17dfsg-1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201106-0192", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "subversion", "scope": "lt", "trust": 1.8, "vendor": "apache", "version": "1.6.17" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.10" }, { "model": "subversion", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "1.6.0" }, { "model": "subversion", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "1.5.0" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.7.3" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "11.04" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "14" }, { "model": "subversion", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "1.5.8" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "15" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.6.z (server)" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux long life", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 5.6 server)" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6.1.z" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.1" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.6" }, { "model": "http server", "scope": null, "trust": 0.6, "vendor": "apache", "version": null }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.7" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.8" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.2" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.3" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.5" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.0" }, { "model": "subversion", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.5.4" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.10.2" }, { "model": "software foundation subversion", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "1.6.17" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.17.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.24" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.6" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "software foundation subversion m3", "scope": null, "trust": 0.3, "vendor": "apache", "version": null }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.15" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.8" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.28.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.1" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "hat enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.9" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.0" }, { "model": "hat enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.37" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.8" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.22.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.35.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.12" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.10.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.33.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20110" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.23" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.36" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.13.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.32.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.21" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.24.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.22" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.11.1" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.18.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.5" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.6" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.10.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14.3" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.4" }, { "model": "software foundation subversion m4/m5", "scope": null, "trust": 0.3, "vendor": "apache", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.7" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.7" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.9" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.29" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14.4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.8" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.3" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.34" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.13.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.4" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.1" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.6" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.15" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.18" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.19.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.3" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.16" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.26" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.1" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "software foundation subversion m1", "scope": null, "trust": 0.3, "vendor": "apache", "version": null }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.13" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.6" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.7" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.19" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "linux enterprise sdk sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.33" }, { "model": "software foundation subversion m2", "scope": null, "trust": 0.3, "vendor": "apache", "version": null }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.20" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.16.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.30" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.7" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.25" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.28.2" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.5.8" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.3" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.28" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.14.5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.35" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.16" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.12" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.13" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.27" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.20.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.17" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.31" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.22.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.4" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.3" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.24.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "software foundation subversion", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.5" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" } ], "sources": [ { "db": "BID", "id": "48091" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "CNNVD", "id": "CNNVD-201106-022" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.3", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-1783" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\u0026lt;br\u0026gt;Joe Schaefer of Apache Software Foundation, Ivan Zhakov of VisualSVN, and Kamesh Jayachandran of CollabNet.", "sources": [ { "db": "BID", "id": "48091" } ], "trust": 0.3 }, "cve": "CVE-2011-1783", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2011-1783", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-49728", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-1783", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201106-022", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-49728", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-49728" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "CNNVD", "id": "CNNVD-201106-022" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data. Apache Subversion is prone to multiple vulnerabilities, including two denial-of-service issues and an information-disclosure issue. \nAttackers can exploit these issues to crash the application, exhaust all memory resources, or obtain potentially sensitive information. \nVersions prior to Subversion 1.6.17 are vulnerable. The server is fast, reliable and extensible through a simple API. \n \n The mod_dav_svn Apache HTTPD server module may in certain cenarios\n enter a logic loop which does not exit and which allocates emory in\n each iteration, ultimately exhausting all the available emory on the\n server which can lead to a DoS (Denial Of Service) (CVE-2011-1783). \n \n The mod_dav_svn Apache HTTPD server module may leak to remote users\n the file contents of files configured to be unreadable by those users\n (CVE-2011-1921). \n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFN6cg2mqjQ0CJFipgRAqj2AKCRyKt813e0OmWSTU5bL58KCmUwowCfT6RY\nDDOtowgSctAg4EX+tLXIvRQ=\n=zsmM\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-02-01-1 OS X Lion v10.7.3 and Security Update 2012-001\n\nOS X Lion v10.7.3 and Security Update 2012-001 is now available and\naddresses the following:\n\nAddress Book\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: An attacker in a privileged network position may intercept\nCardDAV data\nDescription: Address Book supports Secure Sockets Layer (SSL) for\naccessing CardDAV. A downgrade issue caused Address Book to attempt\nan unencrypted connection if an encrypted connection failed. An\nattacker in a privileged network position could abuse this behavior\nto intercept CardDAV data. This issue is addressed by not downgrading\nto an unencrypted connection without user approval. \nCVE-ID\nCVE-2011-3444 : Bernard Desruisseaux of Oracle Corporation\n\nApache\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in Apache\nDescription: Apache is updated to version 2.2.21 to address several\nvulnerabilities, the most serious of which may lead to a denial of\nservice. Further information is available via the Apache web site at\nhttp://httpd.apache.org/\nCVE-ID\nCVE-2011-3348\n\nApache\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \nApache disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. This issue is addressed by providing a configuration\nparameter to control the countermeasure and enabling it by default. \nCVE-ID\nCVE-2011-3389\n\nCFNetwork\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. When accessing a maliciously crafted URL, CFNetwork could send\nthe request to an incorrect origin server. This issue does not affect\nsystems prior to OS X Lion. \nCVE-ID\nCVE-2011-3246 : Erling Ellingsen of Facebook\n\nCFNetwork\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. When accessing a maliciously crafted URL, CFNetwork could send\nunexpected request headers. This issue does not affect systems prior\nto OS X Lion. \nCVE-ID\nCVE-2011-3447 : Erling Ellingsen of Facebook\n\nColorSync\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Viewing a maliciously crafted image with an embedded\nColorSync profile may lead to an unexpected application termination\nor arbitrary code execution\nDescription: An integer overflow existed in the handling of images\nwith an embedded ColorSync profile, which may lead to a heap buffer\noverflow. This issue does not affect OS X Lion systems. \nCVE-ID\nCVE-2011-0200 : binaryproof working with TippingPoint\u0027s Zero Day\nInitiative\n\nCoreAudio\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Playing maliciously crafted audio content may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of AAC\nencoded audio streams. This issue does not affect OS X Lion systems. \nCVE-ID\nCVE-2011-3252 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nCoreMedia\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A heap buffer overflow existed in CoreMedia\u0027s handling\nof H.264 encoded movie files. \nCVE-ID\nCVE-2011-3448 : Scott Stender of iSEC Partners\n\nCoreText\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing or downloading a document containing a maliciously\ncrafted embedded font may lead to an unexpected application\ntermination or arbitrary code execution\nDescription: A use after free issue existed in the handling of font\nfiles. \nCVE-ID\nCVE-2011-3449 : Will Dormann of the CERT/CC\n\nCoreUI\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a malicious website may lead to an unexpected\napplication termination or arbitrary code execution\nDescription: An unbounded stack allocation issue existed in the\nhandling of long URLs. This issue does not affect systems prior to OS\nX Lion. \nCVE-ID\nCVE-2011-3450 : Ben Syverson\n\ncurl\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: A remote server may be able to impersonate clients via\nGSSAPI requests\nDescription: When doing GSSAPI authentication, libcurl\nunconditionally performs credential delegation. This issue is\naddressed by disabling GSSAPI credential delegation. \nCVE-ID\nCVE-2011-2192\n\nData Security\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker with a privileged network position may intercept\nuser credentials or other sensitive information\nDescription: Two certificate authorities in the list of trusted root\ncertificates have independently issued intermediate certificates to\nDigiCert Malaysia. DigiCert Malaysia has issued certificates with\nweak keys that it is unable to revoke. An attacker with a privileged\nnetwork position could intercept user credentials or other sensitive\ninformation intended for a site with a certificate issued by DigiCert\nMalaysia. This issue is addressed by configuring default system trust\nsettings so that DigiCert Malaysia\u0027s certificates are not trusted. We\nwould like to acknowledge Bruce Morton of Entrust, Inc. for reporting\nthis issue. \n\ndovecot\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \nDovecot disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. This issue is addressed by enabling the\ncountermeasure. \nCVE-ID\nCVE-2011-3389 : Apple\n\nfilecmds\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Decompressing a maliciously crafted compressed file may lead\nto an unexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the \u0027uncompress\u0027 command\nline tool. \nCVE-ID\nCVE-2011-2895\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in ImageIO\u0027s handling of\nCCITT Group 4 encoded TIFF files. This issue does not affect OS X\nLion systems. \nCVE-ID\nCVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in libtiff\u0027s handling of\nThunderScan encoded TIFF images. This issue is address by updating\nlibtiff to version 3.9.5. \nCVE-ID\nCVE-2011-1167\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in libpng 1.5.4\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the libpng website at\nhttp://www.libpng.org/pub/png/libpng.html\nCVE-ID\nCVE-2011-3328\n\nInternet Sharing\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: A Wi-Fi network created by Internet Sharing may lose\nsecurity settings after a system update\nDescription: After updating to a version of OS X Lion prior to\n10.7.3, the Wi-Fi configuration used by Internet Sharing may revert\nto factory defaults, which disables the WEP password. This issue only\naffects systems with Internet Sharing enabled and sharing the\nconnection to Wi-Fi. This issue is addressed by preserving the Wi-Fi\nconfiguration during a system update. \nCVE-ID\nCVE-2011-3452 : an anonymous researcher\n\nLibinfo\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in Libinfo\u0027s handling of hostname\nlookup requests. Libinfo could return incorrect results for a\nmaliciously crafted hostname. This issue does not affect systems\nprior to OS X Lion. \nCVE-ID\nCVE-2011-3441 : Erling Ellingsen of Facebook\n\nlibresolv\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Applications that use OS X\u0027s libresolv library may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: An integer overflow existed in the parsing of DNS\nresource records, which may lead to heap memory corruption. \nCVE-ID\nCVE-2011-3453 : Ilja van Sprundel of IOActive\n\nlibsecurity\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Some EV certificates may be trusted even if the\ncorresponding root has been marked as untrusted\nDescription: The certificate code trusted a root certificate to sign\nEV certificates if it was on the list of known EV issuers, even if\nthe user had marked it as \u0027Never Trust\u0027 in Keychain. The root would\nnot be trusted to sign non-EV certificates. \nCVE-ID\nCVE-2011-3422 : Alastair Houghton\n\nOpenGL\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Applications that use OS X\u0027s OpenGL implementation may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues existed in the\nhandling of GLSL compilation. \nCVE-ID\nCVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and\nMarc Schoenefeld of the Red Hat Security Response Team\n\nPHP\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in PHP 5.3.6\nDescription: PHP is updated to version 5.3.8 to address several\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the PHP web site at\nhttp://www.php.net\nCVE-ID\nCVE-2011-1148\nCVE-2011-1657\nCVE-2011-1938\nCVE-2011-2202\nCVE-2011-2483\nCVE-2011-3182\nCVE-2011-3189\nCVE-2011-3267\nCVE-2011-3268\n\nPHP\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in FreeType\u0027s\nhandling of Type 1 fonts. This issue is addressed by updating\nFreeType to version 2.4.7. Further information is available via the\nFreeType site at http://www.freetype.org/\nCVE-ID\nCVE-2011-3256 : Apple\n\nPHP\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in libpng 1.5.4\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the libpng website at\nhttp://www.libpng.org/pub/png/libpng.html\nCVE-ID\nCVE-2011-3328\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Opening a maliciously crafted MP4 encoded file may lead to\nan unexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access issue existed in the\nhandling of MP4 encoded files. \nCVE-ID\nCVE-2011-3458 : Luigi Auriemma and pa_kt both working with\nTippingPoint\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in the handling of font\ntables embedded in QuickTime movie files. \nCVE-ID\nCVE-2011-3248 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An off by one buffer overflow existed in the handling\nof rdrf atoms in QuickTime movie files. \nCVE-ID\nCVE-2011-3459 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted JPEG2000 image file may lead\nto an unexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of JPEG2000\nfiles. \nCVE-ID\nCVE-2011-3250 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Processing a maliciously crafted PNG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of PNG files. \nCVE-ID\nCVE-2011-3460 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of FLC\nencoded movie files\nCVE-ID\nCVE-2011-3249 : Matt \u0027j00ru\u0027 Jurczyk working with TippingPoint\u0027s Zero\nDay Initiative\n\nSquirrelMail\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Multiple vulnerabilities in SquirrelMail\nDescription: SquirrelMail is updated to version 1.4.22 to address\nseveral vulnerabilities, the most serious of which is a cross-site\nscripting issue. This issue does not affect OS X Lion systems. \nFurther information is available via the SquirrelMail web site at\nhttp://www.SquirrelMail.org/\nCVE-ID\nCVE-2010-1637\nCVE-2010-2813\nCVE-2010-4554\nCVE-2010-4555\nCVE-2011-2023\n\nSubversion\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Accessing a Subversion repository may lead to the disclosure\nof sensitive information\nDescription: Subversion is updated to version 1.6.17 to address\nmultiple vulnerabilities, the most serious of which may lead to the\ndisclosure of sensitive information. Further information is available\nvia the Subversion web site at http://subversion.tigris.org/\nCVE-ID\nCVE-2011-1752\nCVE-2011-1783\nCVE-2011-1921\n\nTime Machine\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: A remote attacker may access new backups created by the\nuser\u0027s system\nDescription: The user may designate a remote AFP volume or Time\nCapsule to be used for Time Machine backups. Time Machine did not\nverify that the same device was being used for subsequent backup\noperations. An attacker who is able to spoof the remote volume could\ngain access to new backups created by the user\u0027s system. This issue\nis addressed by verifying the unique identifier associated with a\ndisk for backup operations. \nCVE-ID\nCVE-2011-3462 : Michael Roitzsch of the Technische Universitat\nDresden\n\nTomcat\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Multiple vulnerabilities in Tomcat 6.0.32\nDescription: Tomcat is updated to version 6.0.33 to address multiple\nvulnerabilities, the most serious of which may lead to the disclosure\nof sensitive information. Tomcat is only provided on Mac OS X Server\nsystems. This issue does not affect OS X Lion systems. Further\ninformation is available via the Tomcat site at\nhttp://tomcat.apache.org/\nCVE-ID\nCVE-2011-2204\n\nWebDAV Sharing\nAvailable for: OS X Lion Server v10.7 to v10.7.2\nImpact: Local users may obtain system privileges\nDescription: An issue existed in WebDAV Sharing\u0027s handling of user\nauthentication. A user with a valid account on the server or one of\nits bound directories could cause the execution of arbitrary code\nwith system privileges. This issue does not affect systems prior to\nOS X Lion. \nCVE-ID\nCVE-2011-3463 : Gordon Davisson of Crywolf\n\nWebmail\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted e-mail message may lead to the\ndisclosure of message content\nDescription: A cross-site scripting vulnerability existed in the\nhandling of mail messages. This issue is addressed by updating\nRoundcube Webmail to version 0.6. This issue does not affect systems\nprior to OS X Lion. Further information is available via the\nRoundcube site at http://trac.roundcube.net/\nCVE-ID\nCVE-2011-2937\n\nX11\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in FreeType\u0027s\nhandling of Type 1 fonts. This issue is addressed by updating\nFreeType to version 2.4.7. Further information is available via the\nFreeType site at http://www.freetype.org/\nCVE-ID\nCVE-2011-3256 : Apple\n\nOS X Lion v10.7.3 and Security Update 2012-001 may be obtained from\nthe Software Update pane in System Preferences, or Apple\u0027s Software\nDownloads web site:\nhttp://www.apple.com/support/downloads/\n\nThe Software Update utility will present the update that applies\nto your system configuration. Only one is needed, either\nSecurity Update 2021-001 or OS X v10.7.3. \n\nFor OS X Lion v10.7.2\nThe download file is named: MacOSXUpd10.7.3.dmg\nIts SHA-1 digest is: 7102fe8f9f47286c45dfa35f6e84e7f730493a7c\n\nFor OS X Lion v10.7 and v10.7.1\nThe download file is named: MacOSXUpdCombo10.7.3.dmg\nIts SHA-1 digest is: 07dfce300f6801eb63d9ac13e0bec84e1862a16c\n\nFor OS X Lion Server v10.7.2\nThe download file is named: MacOSXServerUpd10.7.3.dmg\nIts SHA-1 digest is: 55a9571635d4ec088c142d68132d0d69fcb8867d\n\nFor OS X Lion Server v10.7 and v10.7.1\nThe download file is named: MacOSXServerUpdCombo10.7.3.dmg\nIts SHA-1 digest is: 2c87824f09734499ea166ea0617a3ac21ecf832b\n\nFor Mac OS X v10.6.8\nThe download file is named: SecUpd2012-001Snow.dmg\nIts SHA-1 digest is: 40875ee8cb609bbaefc8f421a9c34cc353db42b8\n\nFor Mac OS X Server v10.6.8\nThe download file is named: SecUpdSrvr2012-001.dmg\nIts SHA-1 digest is: 53b3ca5548001a9920aeabed4a034c6e4657fe20\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.16 (Darwin)\n\niQEcBAEBAgAGBQJPKYxNAAoJEGnF2JsdZQeeLiIIAMLhH2ipDFrhCsw/n4VDeF1V\nP6jSkGXC9tBBVMvw1Xq4c2ok4SI34bDfMlURAVR+dde/h6nIZR24aLQVoDLjJuIp\nRrO2dm1nQeozLJSx2NbxhVh54BucJdKp4xS1GkDNxkqcdh04RE9hRURXdKagnfGy\n9P8QQPOQmKAiWos/LYhCPDInMfrpVNvEVwP8MCDP15g6hylN4De/Oyt7ZshPshSf\nMnAFObfBTGX5KioVqTyfdlBkKUfdXHJux61QEFHn8eadX6+/6IuKbUvK9B0icc8E\npvbjOxQatFRps0KNWeIsKQc5i6iQoJhocAiIy6Y6LCuZQuSXCImY2RWXkVYzbWo=\n=c1eU\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\n\nJoin Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria\nSee to the presentation \"The Dynamics and Threats of End-Point Software Portfolios\" by Secunia\u0027s Research Analyst Director, Stefan Frei. \nRead more:\nhttp://conference.first.org/ \n\n\n----------------------------------------------------------------------\n\nTITLE:\nApache Subversion mod_dav_svn Two Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA44681\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44681/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44681\n\nRELEASE DATE:\n2011-06-02\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44681/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44681/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44681\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Apache Subversion, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Reported by the vendor\n2) The vendor credits Ivan Zhakov, VisualSVN. \n\nORIGINAL ADVISORY:\nhttp://subversion.apache.org/security/CVE-2011-1752-advisory.txt\nhttp://subversion.apache.org/security/CVE-2011-1783-advisory.txt\nhttp://subversion.apache.org/security/CVE-2011-1921-advisory.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201309-11\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Low\n Title: Subversion: Multiple vulnerabilities\n Date: September 23, 2013\n Bugs: #350166, #356741, #369065, #463728, #463860, #472202, #482166\n ID: 201309-11\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Subversion, allowing\nattackers to cause a Denial of Service, escalate privileges, or obtain\nsensitive information. \n\nBackground\n==========\n\nSubversion is a versioning system designed to be a replacement for CVS. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-vcs/subversion \u003c 1.7.13 \u003e= 1.7.13\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Subversion. Please\nreview the CVE identifiers referenced below for details. A local attacker could escalate his privileges\nto the user running svnserve. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Subversion users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-vcs/subversion-1.7.13\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539\n[ 2 ] CVE-2010-4644\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644\n[ 3 ] CVE-2011-0715\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715\n[ 4 ] CVE-2011-1752\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752\n[ 5 ] CVE-2011-1783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783\n[ 6 ] CVE-2011-1921\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921\n[ 7 ] CVE-2013-1845\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845\n[ 8 ] CVE-2013-1846\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846\n[ 9 ] CVE-2013-1847\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847\n[ 10 ] CVE-2013-1849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849\n[ 11 ] CVE-2013-1884\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884\n[ 12 ] CVE-2013-1968\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968\n[ 13 ] CVE-2013-2088\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088\n[ 14 ] CVE-2013-2112\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112\n[ 15 ] CVE-2013-4131\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131\n[ 16 ] CVE-2013-4277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201309-11.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: subversion security update\nAdvisory ID: RHSA-2011:0862-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-0862.html\nIssue date: 2011-06-08\nCVE Names: CVE-2011-1752 CVE-2011-1783 CVE-2011-1921 \n=====================================================================\n\n1. Summary:\n\nUpdated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\n\n3. Description:\n\nSubversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP. \n\nAn infinite loop flaw was found in the way the mod_dav_svn module processed\ncertain data sets. If the SVNPathAuthz directive was set to\n\"short_circuit\", and path-based access control for files and directories\nwas enabled, a malicious, remote user could use this flaw to cause the\nhttpd process serving the request to consume an excessive amount of system\nmemory. (CVE-2011-1783)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed requests submitted against the URL of a baselined resource. A\nmalicious, remote user could use this flaw to cause the httpd process\nserving the request to crash. (CVE-2011-1752)\n\nAn information disclosure flaw was found in the way the mod_dav_svn\nmodule processed certain URLs when path-based access control for files and\ndirectories was enabled. A malicious, remote user could possibly use this\nflaw to access certain files in a repository that would otherwise not be\naccessible to them. Note: This vulnerability cannot be triggered if the\nSVNPathAuthz directive is set to \"short_circuit\". Upstream acknowledges Joe Schaefer of the Apache Software\nFoundation as the original reporter of CVE-2011-1752; Ivan Zhakov of\nVisualSVN as the original reporter of CVE-2011-1783; and Kamesh\nJayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921. \n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n709111 - CVE-2011-1752 subversion (mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources\n709112 - CVE-2011-1783 subversion (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control\n709114 - CVE-2011-1921 subversion (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users\n\n6. Package List:\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm\n\ni386:\nmod_dav_svn-1.6.11-7.el5_6.4.i386.rpm\nsubversion-1.6.11-7.el5_6.4.i386.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm\nsubversion-devel-1.6.11-7.el5_6.4.i386.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.i386.rpm\nsubversion-perl-1.6.11-7.el5_6.4.i386.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.i386.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-1.6.11-7.el5_6.4.i386.rpm\nsubversion-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-devel-1.6.11-7.el5_6.4.i386.rpm\nsubversion-devel-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-perl-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/subversion-1.6.11-7.el5_6.4.src.rpm\n\ni386:\nmod_dav_svn-1.6.11-7.el5_6.4.i386.rpm\nsubversion-1.6.11-7.el5_6.4.i386.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm\nsubversion-devel-1.6.11-7.el5_6.4.i386.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.i386.rpm\nsubversion-perl-1.6.11-7.el5_6.4.i386.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.i386.rpm\n\nia64:\nmod_dav_svn-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-devel-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-perl-1.6.11-7.el5_6.4.ia64.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.ia64.rpm\n\nppc:\nmod_dav_svn-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-1.6.11-7.el5_6.4.ppc64.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.ppc64.rpm\nsubversion-devel-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-devel-1.6.11-7.el5_6.4.ppc64.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-perl-1.6.11-7.el5_6.4.ppc.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.ppc.rpm\n\ns390x:\nmod_dav_svn-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-1.6.11-7.el5_6.4.s390.rpm\nsubversion-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.s390.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-devel-1.6.11-7.el5_6.4.s390.rpm\nsubversion-devel-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-perl-1.6.11-7.el5_6.4.s390x.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.s390x.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-1.6.11-7.el5_6.4.i386.rpm\nsubversion-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.i386.rpm\nsubversion-debuginfo-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-devel-1.6.11-7.el5_6.4.i386.rpm\nsubversion-devel-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-perl-1.6.11-7.el5_6.4.x86_64.rpm\nsubversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\ni386:\nmod_dav_svn-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\n\nnoarch:\nsubversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\nnoarch:\nsubversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\ni386:\nmod_dav_svn-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\n\nppc64:\nmod_dav_svn-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm\n\ns390x:\nmod_dav_svn-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-1.6.11-2.el6_1.4.s390.rpm\nsubversion-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\ni386:\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\n\nnoarch:\nsubversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm\n\nppc64:\nsubversion-debuginfo-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-devel-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-devel-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-kde-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-kde-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-perl-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-perl-1.6.11-2.el6_1.4.ppc64.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.ppc.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.ppc64.rpm\n\ns390x:\nsubversion-debuginfo-1.6.11-2.el6_1.4.s390.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-devel-1.6.11-2.el6_1.4.s390.rpm\nsubversion-devel-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.s390.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.s390.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-kde-1.6.11-2.el6_1.4.s390.rpm\nsubversion-kde-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-perl-1.6.11-2.el6_1.4.s390.rpm\nsubversion-perl-1.6.11-2.el6_1.4.s390x.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.s390.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.s390x.rpm\n\nx86_64:\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\ni386:\nmod_dav_svn-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\n\nx86_64:\nmod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-1.6.11-2.el6_1.4.i686.rpm\nsubversion-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/subversion-1.6.11-2.el6_1.4.src.rpm\n\ni386:\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\n\nnoarch:\nsubversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm\n\nx86_64:\nsubversion-debuginfo-1.6.11-2.el6_1.4.i686.rpm\nsubversion-debuginfo-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-devel-1.6.11-2.el6_1.4.i686.rpm\nsubversion-devel-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.i686.rpm\nsubversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-kde-1.6.11-2.el6_1.4.i686.rpm\nsubversion-kde-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-perl-1.6.11-2.el6_1.4.i686.rpm\nsubversion-perl-1.6.11-2.el6_1.4.x86_64.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.i686.rpm\nsubversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-1752.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1783.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1921.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttp://subversion.apache.org/security/CVE-2011-1783-advisory.txt\nhttp://subversion.apache.org/security/CVE-2011-1752-advisory.txt\nhttp://subversion.apache.org/security/CVE-2011-1921-advisory.txt\n\n8. Contact:\n\nThe Red Hat security contact is \u0026lt;secalert@redhat.com\u0026gt;. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFN75utXlSAg2UNWIIRAuXgAJ9fhhY1xxC7jRZbLGZA6ENr3dnTBQCgkdf0\nJ9nA8MJRlM/XVtyj3mbVErg=\n=jujC\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2011-1752\n\n The mod_dav_svn Apache HTTPD server module can be crashed though\n when asked to deliver baselined WebDAV resources. \n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 1.5.1dfsg1-7. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 1.6.12dfsg-6. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.6.17dfsg-1", "sources": [ { "db": "NVD", "id": "CVE-2011-1783" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "BID", "id": "48091" }, { "db": "VULHUB", "id": "VHN-49728" }, { "db": "PACKETSTORM", "id": "102004" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "101937" }, { "db": "PACKETSTORM", "id": "123358" }, { "db": "PACKETSTORM", "id": "102118" }, { "db": "PACKETSTORM", "id": "101948" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-1783", "trust": 3.4 }, { "db": "BID", "id": "48091", "trust": 2.8 }, { "db": "SECUNIA", "id": "44681", "trust": 2.7 }, { "db": "SECTRACK", "id": "1025618", "trust": 2.5 }, { "db": "SECUNIA", "id": "44633", "trust": 1.7 }, { "db": "SECUNIA", "id": "44849", "trust": 1.7 }, { "db": "SECUNIA", "id": "44888", "trust": 1.7 }, { "db": "SECUNIA", "id": "45162", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2011-001722", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201106-022", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-49728", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102004", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101937", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123358", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102118", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101948", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-49728" }, { "db": "BID", "id": "48091" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "PACKETSTORM", "id": "102004" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "101937" }, { "db": "PACKETSTORM", "id": "123358" }, { "db": "PACKETSTORM", "id": "102118" }, { "db": "PACKETSTORM", "id": "101948" }, { "db": "CNNVD", "id": "CNNVD-201106-022" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "id": "VAR-201106-0192", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-49728" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:13:11.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "subversion-1.6.11-7.AXS3.4", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1454" }, { "title": "RHSA-2011:0862", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0862.html" }, { "title": "CVE-2011-1783-advisory", "trust": 0.8, "url": "http://subversion.apache.org/security/cve-2011-1783-advisory.txt" }, { "title": "Subversion 1.6.17 Released", "trust": 0.8, "url": "http://svn.haxx.se/dev/archive-2011-06/0030.shtml" }, { "title": "Apache Subversion mod_dav_svn Repair measures for infinite loop loopholes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=129503" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "CNNVD", "id": "CNNVD-201106-022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-49728" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://secunia.com/advisories/44681" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/48091" }, { "trust": 2.2, "url": "http://subversion.apache.org/security/cve-2011-1783-advisory.txt" }, { "trust": 1.8, "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/changes" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1025618" }, { "trust": 1.7, "url": "http://secunia.com/advisories/44633" }, { "trust": 1.7, "url": "http://secunia.com/advisories/44849" }, { "trust": 1.7, "url": "http://secunia.com/advisories/44888" }, { "trust": 1.7, "url": "http://secunia.com/advisories/45162" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html" }, { "trust": 1.7, "url": "http://www.debian.org/security/2011/dsa-2251" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-july/062211.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-june/061913.html" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:106" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2011-0862.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1144-1" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5130" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a18889" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1783" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1783" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id/1025618" }, { "trust": 0.5, "url": "http://subversion.apache.org/security/cve-2011-1752-advisory.txt" }, { "trust": 0.5, "url": "http://subversion.apache.org/security/cve-2011-1921-advisory.txt" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1752" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1783" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1921" }, { "trust": 0.3, "url": "http://subversion.apache.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100141174" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://store.mandriva.com/product_info.php?cpath=149\u0026amp;products_id=490" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1921" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1752" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2204" }, { "trust": 0.1, "url": "http://www.php.net" }, { "trust": 0.1, "url": "http://tomcat.apache.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2023" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3252" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1148" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1167" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3182" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3249" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0200" }, { "trust": 0.1, "url": "http://trac.roundcube.net/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3256" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4554" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2202" }, { "trust": 0.1, "url": "http://www.freetype.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0241" }, { "trust": 0.1, "url": "http://www.squirrelmail.org/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1938" }, { "trust": 0.1, "url": "http://httpd.apache.org/" }, { "trust": 0.1, "url": "http://www.libpng.org/pub/png/libpng.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2483" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2813" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1657" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3246" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2937" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1637" }, { "trust": 0.1, "url": "http://subversion.tigris.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3189" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://conference.first.org/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44681" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44681/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44681/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1845" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4539" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1968" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0715" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1846" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2088" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1847" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2112" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4277" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1846" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2088" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4539" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2112" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0715" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1752" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4644" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4131" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1847" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1845" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1968" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1884" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1921" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4644" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201309-11.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4131" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4277" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1783" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1752.html" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1783.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-0862.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1921.html" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-49728" }, { "db": "BID", "id": "48091" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "PACKETSTORM", "id": "102004" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "101937" }, { "db": "PACKETSTORM", "id": "123358" }, { "db": "PACKETSTORM", "id": "102118" }, { "db": "PACKETSTORM", "id": "101948" }, { "db": "CNNVD", "id": "CNNVD-201106-022" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-49728" }, { "db": "BID", "id": "48091" }, { "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "db": "PACKETSTORM", "id": "102004" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "101937" }, { "db": "PACKETSTORM", "id": "123358" }, { "db": "PACKETSTORM", "id": "102118" }, { "db": "PACKETSTORM", "id": "101948" }, { "db": "CNNVD", "id": "CNNVD-201106-022" }, { "db": "NVD", "id": "CVE-2011-1783" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-06-06T00:00:00", "db": "VULHUB", "id": "VHN-49728" }, { "date": "2011-06-02T00:00:00", "db": "BID", "id": "48091" }, { "date": "2011-06-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "date": "2011-06-04T16:01:34", "db": "PACKETSTORM", "id": "102004" }, { "date": "2012-02-03T00:24:52", "db": "PACKETSTORM", "id": "109373" }, { "date": "2011-06-02T05:38:07", "db": "PACKETSTORM", "id": "101937" }, { "date": "2013-09-23T22:22:00", "db": "PACKETSTORM", "id": "123358" }, { "date": "2011-06-09T15:11:39", "db": "PACKETSTORM", "id": "102118" }, { "date": "2010-06-02T12:12:00", "db": "PACKETSTORM", "id": "101948" }, { "date": "2011-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-022" }, { "date": "2011-06-06T19:55:01.940000", "db": "NVD", "id": "CVE-2011-1783" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-05T00:00:00", "db": "VULHUB", "id": "VHN-49728" }, { "date": "2015-05-07T17:04:00", "db": "BID", "id": "48091" }, { "date": "2011-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001722" }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-022" }, { "date": "2020-10-05T19:05:44.950000", "db": "NVD", "id": "CVE-2011-1783" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "102004" }, { "db": "PACKETSTORM", "id": "102118" }, { "db": "CNNVD", "id": "CNNVD-201106-022" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Subversion Used in Apache HTTP Server Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001722" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201106-022" } ], "trust": 0.6 } }
ghsa-6hv5-jvfr-j4jm
Vulnerability from github
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
{ "affected": [], "aliases": [ "CVE-2011-1783" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-06-06T19:55:00Z", "severity": "MODERATE" }, "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GHSA-6hv5-jvfr-j4jm", "modified": "2022-05-13T01:14:59Z", "published": "2022-05-13T01:14:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/44633" }, { "type": "WEB", "url": "http://secunia.com/advisories/44681" }, { "type": "WEB", "url": "http://secunia.com/advisories/44849" }, { "type": "WEB", "url": "http://secunia.com/advisories/44888" }, { "type": "WEB", "url": "http://secunia.com/advisories/45162" }, { "type": "WEB", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5130" }, { "type": "WEB", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/48091" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025618" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1144-1" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2011-1783
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-1783", "description": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GSD-2011-1783", "references": [ "https://www.suse.com/security/cve/CVE-2011-1783.html", "https://www.debian.org/security/2011/dsa-2251", "https://access.redhat.com/errata/RHSA-2011:0862", "https://linux.oracle.com/cve/CVE-2011-1783.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-1783" ], "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GSD-2011-1783", "modified": "2023-12-13T01:19:08.385567Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1783", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "http://secunia.com/advisories/44633", "refsource": "MISC", "url": "http://secunia.com/advisories/44633" }, { "name": "http://secunia.com/advisories/44681", "refsource": "MISC", "url": "http://secunia.com/advisories/44681" }, { "name": "http://secunia.com/advisories/44849", "refsource": "MISC", "url": "http://secunia.com/advisories/44849" }, { "name": "http://secunia.com/advisories/44888", "refsource": "MISC", "url": "http://secunia.com/advisories/44888" }, { "name": "http://secunia.com/advisories/45162", "refsource": "MISC", "url": "http://secunia.com/advisories/45162" }, { "name": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "refsource": "MISC", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "MISC", "url": "http://support.apple.com/kb/HT5130" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES", "refsource": "MISC", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "http://www.debian.org/security/2011/dsa-2251", "refsource": "MISC", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-0862.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "http://www.securityfocus.com/bid/48091", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/48091" }, { "name": "http://www.securitytracker.com/id?1025618", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1025618" }, { "name": "http://www.ubuntu.com/usn/USN-1144-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=709112", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1783" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=709112", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "DSA-2251", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "44681", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "44633", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "name": "MDVSA-2011:106", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "1025618", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "RHSA-2011:0862", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8352", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "USN-1144-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "name": "44888", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "name": "44849", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "name": "45162", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "name": "FEDORA-2011-8341", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "oval:org.mitre.oval:def:18889", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-10-05T19:05Z", "publishedDate": "2011-06-06T19:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.