A Subversion client sometimes connects to URLs provided by the repository. A maliciously constructed svn+ssh:// URL would cause Subversion clients to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to an honest server (to attack another user of that server’s repositories), or by a proxy server (CVE-2017-9800).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 5 | noarch | subversion | <Â 1.8.19-1 | subversion-1.8.19-1.mga5 |
Mageia | 6 | noarch | subversion | <Â 1.9.7-1 | subversion-1.9.7-1.mga6 |
mail-archives.apache.org/mod_mbox/subversion-announce/201708.mbox/%3C8760dvl2j6.fsf%40codematters.co.uk%3E
subversion.apache.org/security/CVE-2017-9800-advisory.txt
svn.apache.org/repos/asf/subversion/tags/1.8.19/CHANGES
svn.apache.org/repos/asf/subversion/tags/1.9.7/CHANGES
bugs.mageia.org/show_bug.cgi?id=21495
mail-archives.apache.org/mod_mbox/subversion-announce/201708.mbox/%3C2fefe468-7d41-11e7-aea1-9312c6089150%40apache.org%3E