{"id":"CVE-2010-4539","details":"The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.","modified":"2026-04-10T03:41:31.590500Z","published":"2011-01-07T19:00:19Z","related":["openSUSE-SU-2024:10538-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/42780"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42969"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43115"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43139"},{"type":"ADVISORY","url":"http://secunia.com/advisories/43346"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:006"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1053-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0015"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0103"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0162"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0264"},{"type":"EVIDENCE","url":"https://bugzilla.redhat.com/show_bug.cgi?id=667407"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2011/01/02/1"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2011/01/04/10"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2011/01/04/8"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2011/01/05/4"},{"type":"FIX","url":"http://svn.apache.org/viewvc?view=revision&revision=1033166"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=667407"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2011/01/03/9"},{"type":"WEB","url":"http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-0257.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-0258.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/45655"},{"type":"WEB","url":"http://www.securitytracker.com/id?1024934"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64472"}],"schema_version":"1.7.5"}