Versions Packages Information History CVEs Related Badges Report

Versions for subversion

537 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
subversion-dbg 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-dev 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-kwallet 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-gnome 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-pl 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-lang 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
Adélie Linux current
user
subversion-doc 1.14.0 Potentially vulnerable - awilfox@adelielinux.org
AIX Open Source Packages subversion 1.8.10 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.10 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.9 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.8 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.5 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.3 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.1 Potentially vulnerable - -
AIX Open Source Packages subversion 1.8.0 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.14 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.13 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.11 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.10 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.9 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.8 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.8 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.8 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.7 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.7 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.5 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.3 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.3 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.3 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.2 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.1 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.1 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.1 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.0 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.0 Potentially vulnerable - -
AIX Open Source Packages subversion 1.7.0 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.23 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.21 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.20 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.20 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.19 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.18 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.18 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.17 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.16 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.15 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.13 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.12 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.9 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.9 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.5 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.3 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.2 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.1 Potentially vulnerable - -
AIX Open Source Packages subversion 1.6.0 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.9 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.7 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.5 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.4 Potentially vulnerable - -
AIX Open Source Packages subversion 1.5.2 Potentially vulnerable - -
AIX Open Source Packages subversion 1.4.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.4.6 Potentially vulnerable - -
AIX Open Source Packages subversion 1.4.5 Potentially vulnerable - -
AIX Toolbox subversion 1.10.6 Potentially vulnerable Utilities/System -
AIX Toolbox subversion 1.10.6 Potentially vulnerable Utilities/System -
AIX Toolbox subversion 1.10.4 Potentially vulnerable Utilities/System -
AIX Toolbox subversion 1.10.3 Potentially vulnerable Utilities/System -
AIX Toolbox subversion 1.10.2 Potentially vulnerable Utilities/System -
AIX Toolbox subversion 1.9.7 Potentially vulnerable Utilities/System -
AlmaLinux 8
AppStream
subversion 1.14.1 Unspecified packager@almalinux.org
AlmaLinux 8
AppStream
subversion 1.10.2 Potentially vulnerable Development/Tools packager@almalinux.org
Alpine Linux 3.8
main
py-subversion 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
subversion-doc 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
mod_dav_svn 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
perl-subversion 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
subversion 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
subversion-bash-completion 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
subversion-dev 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
subversion-libs 1.10.6 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
subversion-doc 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
perl-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
mod_dav_svn 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
subversion-libs 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
py-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
subversion-dev 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
subversion-bash-completion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
mod_dav_svn 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
py-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
subversion-libs 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
subversion-dev 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
subversion-doc 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
subversion-bash-completion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
perl-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion-dev 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
mod_dav_svn 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion-doc 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
py-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion-libs 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion-openrc 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
subversion-bash-completion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
perl-subversion 1.12.2 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
py3-subversion 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion-doc 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion-bash-completion 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
perl-subversion 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion-openrc 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion-libs 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
mod_dav_svn 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
subversion-dev 1.13.0 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
perl-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion-openrc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion-libs 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
py3-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion-bash-completion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion-doc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
subversion-dev 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.13
main
mod_dav_svn 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
py3-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion-doc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion-bash-completion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
mod_dav_svn 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion-openrc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion-libs 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
subversion-dev 1.14.1 - ncopa@alpinelinux.org
Alpine Linux 3.14
main
perl-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
mod_dav_svn 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion-openrc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion-bash-completion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion-libs 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion-doc 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
perl-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
py3-subversion 1.14.1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
subversion-dev 1.14.1 - ncopa@alpinelinux.org
ALT Linux p9 subversion 1.14.1 Development/Other cas@altlinux.org
ALT Linux p10 subversion 1.14.1 Development/Other cas@altlinux.org
ALT Sisyphus subversion 1.14.1 Development/Other cas@altlinux.org
Amazon Linux 1
main
subversion 1.9.7 Potentially vulnerable Development/Tools -
Amazon Linux 1
main
mod_dav_svn 1.9.7 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
subversion 1.9.7 Potentially vulnerable Development/Tools -
Amazon Linux 1
updates
subversion 1.9.7 Potentially vulnerable Development/Tools -
Amazon Linux 2 subversion 1.7.14 Potentially vulnerable Development/Tools -
Amazon Linux 2 subversion 1.7.14 Potentially vulnerable Development/Tools -
Amazon Linux 2 subversion 1.7.14 Potentially vulnerable Development/Tools -
AOSC subversion 1.13.0 Potentially vulnerable vcs fallback-mnt-aosc@repology
Apertis v2020
v2020/development
subversion 1.10.4 Potentially vulnerable main jamessan@debian.org
Apertis v2021
v2021/development
subversion 1.10.4 Potentially vulnerable main jamessan@debian.org
Apertis v2022 Development
v2022dev2/development
subversion 1.14.1 main jamessan@debian.org
Arch
extra
subversion 1.14.1 - -
Artix
world
subversion 1.14.1 - -
Astra Orel Stable
main
subversion 1.10.0 Potentially vulnerable vcs jamessan@debian.org
Astra Orel Current
main
subversion 1.10.0 Potentially vulnerable vcs jamessan@debian.org
Ataraxia GNU/Linux subversion 1.14.1 devel nagakamira@gmail.com
CentOS 6
os
subversion 1.6.11 Potentially vulnerable Development/Tools -
CentOS 7
os
subversion 1.7.14 Potentially vulnerable Development/Tools -
CentOS 8
AppStream
subversion 1.14.1 Unspecified bugs@centos.org
CentOS 8
AppStream
subversion 1.10.2 Potentially vulnerable Development/Tools bugs@centos.org
Chakra
core
subversion 1.13.0 Potentially vulnerable - -
Chakra Testing
testing
subversion 1.14.0 Potentially vulnerable - -
CRUX 3.4
opt
subversion 1.9.10 Potentially vulnerable - -
CRUX 3.4
contrib
subversion-perl 1.9.9 Potentially vulnerable - jvogel4@stny.rr.com
CRUX 3.4
contrib
subversion-python 1.9.9 Potentially vulnerable - jvogel4@stny.rr.com
CRUX 3.4
opt
subversion-bashcompletion 1.9.0 Potentially vulnerable - sepen@crux.nu
CRUX 3.5
contrib
subversion 1.14.0 Potentially vulnerable - jvogel4@stny.rr.com
CRUX 3.5
contrib
subversion-perl 1.14.0 Potentially vulnerable - jvogel4@stny.rr.com
CRUX 3.5
contrib
subversion-python 1.14.0 Potentially vulnerable - jvogel4@stny.rr.com
CRUX 3.5
opt
subversion-bashcompletion 1.9.0 Potentially vulnerable - sepen@crux.nu
CRUX 3.6
contrib
subversion 1.14.1 - jvogel4@stny.rr.com
Cygwin subversion 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-debuginfo 1.14.1 Debug marco.atzeri@cygwin
Cygwin subversion-devel 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-gnome 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-httpd 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-perl 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-python 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-ruby 1.14.1 Devel marco.atzeri@cygwin
Cygwin subversion-tools 1.14.1 Devel marco.atzeri@cygwin
Debian 8
jessie/main
subversion 1.8.10 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org, troyh@debian.org
Debian 9
stretch/main
subversion 1.9.5 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org
Debian 10
buster/main
subversion 1.10.4 Potentially vulnerable vcs jamessan@debian.org
Debian 11
bullseye/main
subversion 1.14.1 vcs jamessan@debian.org
Debian 12
bookworm/main
subversion 1.14.1 vcs jamessan@debian.org
Debian Stable
stable/main
subversion 1.14.1 vcs jamessan@debian.org
Debian Testing
testing/main
subversion 1.14.1 vcs jamessan@debian.org
Debian Unstable
sid/main
subversion 1.14.1 vcs jamessan@debian.org
Deepin
main
subversion 1.10.4.1 Potentially vulnerable - jamessan@debian.org
Devuan 1.0 (Jessie)
jessie/main
subversion 1.8.10 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org, troyh@debian.org
Devuan 2.0 (ASCII)
ascii/main
subversion 1.9.5 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
subversion 1.10.4 Potentially vulnerable vcs jamessan@debian.org
Devuan 4.0 (Chimaera)
chimaera/main
subversion 1.14.1 vcs jamessan@debian.org
Devuan Unstable
unstable/main
subversion 1.14.1 vcs jamessan@debian.org
DistroWatch.com subversion 1.14.1 - -
DPorts devel/p5-subversion 1.14.1 devel lev@freebsd.org
DPorts devel/py-subversion 1.14.1 devel lev@freebsd.org
DPorts devel/ruby-subversion 1.14.1 devel lev@freebsd.org
DPorts security/subversion-gnome-keyring 1.14.1 security lev@freebsd.org
DPorts www/mod_dav_svn 1.14.1 www lev@freebsd.org
DPorts devel/subversion 1.14.1 devel lev@freebsd.org
DPorts java/java-subversion 1.14.1 java lev@freebsd.org
DPorts devel/py-subversion 1.10.7 devel lev@freebsd.org
DPorts devel/subversion-lts 1.10.7 devel lev@freebsd.org
Entware
mipselsf-k3.4
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
aarch64-k3.10
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
aarch64-k3.10
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
aarch64-k3.10
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
armv5sf-k3.2
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
armv5sf-k3.2
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
armv5sf-k3.2
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k2.6
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k2.6
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k2.6
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k3.2
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k3.2
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
armv7sf-k3.2
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
mipselsf-k3.4
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
mipselsf-k3.4
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
mipssf-k3.4
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
mipssf-k3.4
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
mipssf-k3.4
subversion-server 1.14.1 net val.kulkov@gmail.com
Entware
x64-k3.2
subversion-client 1.14.1 net val.kulkov@gmail.com
Entware
x64-k3.2
subversion-libs 1.14.1 net val.kulkov@gmail.com
Entware
x64-k3.2
subversion-server 1.14.1 net val.kulkov@gmail.com
Exherbo
arbor
dev-scm/subversion 1.14.1 dev-scm fallback-mnt-exherbo@repology
Fedora 26
updates
subversion 1.9.7 Potentially vulnerable Development/Tools -
Fedora 26
release
subversion 1.9.5 Potentially vulnerable Development/Tools -
Fedora 26
release
subversion-api-docs 1.9.5 Potentially vulnerable Development/Tools -
Fedora 27
release
subversion 1.9.7 Potentially vulnerable Development/Tools -
Fedora 27
release
subversion-api-docs 1.9.6 Potentially vulnerable Development/Tools -
Fedora 28
updates
subversion 1.11.1 Potentially vulnerable Development/Tools -
Fedora 28
updates
subversion-api-docs 1.11.1 Potentially vulnerable Unspecified -
Fedora 28
release
subversion 1.9.7 Potentially vulnerable Development/Tools -
Fedora 28
release
subversion-api-docs 1.9.7 Potentially vulnerable Development/Tools -
Fedora 29
updates
subversion 1.12.2 Potentially vulnerable Unspecified -
Fedora 29
updates
subversion-api-docs 1.12.0 Potentially vulnerable Unspecified -
Fedora 29
release
subversion 1.10.2 Potentially vulnerable Development/Tools -
Fedora 29
release
subversion-api-docs 1.10.2 Potentially vulnerable Development/Tools -
Fedora 30
updates
subversion 1.12.2 Potentially vulnerable Unspecified -
Fedora 30
updates
subversion-api-docs 1.12.0 Potentially vulnerable Unspecified -
Fedora 30
release
subversion 1.11.1 Potentially vulnerable Unspecified -
Fedora 30
release
subversion-api-docs 1.11.1 Potentially vulnerable Unspecified -
Fedora 31
release
subversion 1.12.2 Potentially vulnerable Unspecified -
Fedora 31
release
subversion-api-docs 1.12.2 Potentially vulnerable Unspecified -
Fedora 31
updates
subversion 1.12.2 Potentially vulnerable Unspecified -
Fedora 32
updates
subversion 1.14.1 Unspecified -
Fedora 32
release
subversion 1.12.2 Potentially vulnerable Unspecified -
Fedora 32
release
subversion-api-docs 1.12.2 Potentially vulnerable Unspecified -
Fedora 33
updates
subversion 1.14.1 Unspecified -
Fedora 33
release
subversion 1.14.0 Potentially vulnerable Unspecified -
Fedora 33
release
subversion-api-docs 1.14.0 Potentially vulnerable Unspecified -
Fedora 34
release
subversion 1.14.1 Unspecified -
Fedora 34
release
subversion-api-docs 1.14.0 Potentially vulnerable Unspecified -
Fedora Rawhide subversion 1.14.1 Unspecified -
Fedora Rawhide subversion-api-docs 1.14.1 Unspecified -
FreeBSD Ports security/subversion-gnome-keyring 1.14.1 security lev@freebsd.org
FreeBSD Ports www/mod_dav_svn 1.14.1 www lev@freebsd.org
FreeBSD Ports devel/subversion 1.14.1 devel lev@freebsd.org
FreeBSD Ports java/java-subversion 1.14.1 java lev@freebsd.org
FreeBSD Ports devel/p5-subversion 1.14.1 devel lev@freebsd.org
FreeBSD Ports devel/py-subversion 1.14.1 devel lev@freebsd.org
FreeBSD Ports devel/ruby-subversion 1.14.1 devel lev@freebsd.org
FreeBSD Ports devel/subversion-lts 1.10.7 devel lev@freebsd.org
FreeBSD Ports devel/py-subversion 1.10.7 devel lev@freebsd.org
Funtoo 1.4
dev-kit
dev-vcs/subversion 1.14.0 Potentially vulnerable dev-vcs fallback-mnt-funtoo@repology
Gentoo dev-vcs/subversion 1.14.1 dev-vcs dilfridge@gentoo.org, zlogene@gentoo.org
GNU Guix subversion 1.14.1 - -
GoboLinux Subversion 1.9.5 Potentially vulnerable - -
GoboLinux Subversion-Python 1.6.5 Potentially vulnerable - -
GoboLinux Subversion-Perl 1.6.5 Potentially vulnerable - -
HaikuPorts master dev-vcs/subversion 1.14.1 dev-vcs -
Homebrew subversion 1.14.1 - -
Homebrew subversion@1.8 1.8.19 Potentially vulnerable - -
HP-UX 11.31
ia64_64
subversion 1.14.1 - -
HP-UX 11.31
hppa_32
subversion 1.14.0 Potentially vulnerable - -
HP-UX 11.31
ia64_64
subversion 1.14.0 Potentially vulnerable - -
HP-UX 11.31
hppa_32
subversion 1.9.6 Potentially vulnerable - -
HP-UX 11.31
ia64_32
subversion 1.9.6 Potentially vulnerable - -
HP-UX 11.31
hppa_32
subversion 1.8.5 Potentially vulnerable - -
Hyperbola
extra
subversion 1.9.5 Potentially vulnerable - -
just-install subversion 1.14.1 - -
Kali Linux Rolling
main
subversion 1.14.1 vcs jamessan@debian.org
KaOS
core
subversion 1.14.1 - demm@kaosx.us
LiGurOS stable dev-vcs/subversion 1.14.1 dev-vcs dilfridge@gentoo.org, zlogene@gentoo.org
LiGurOS develop dev-vcs/subversion 1.14.1 dev-vcs dilfridge@gentoo.org, zlogene@gentoo.org
Linuxbrew subversion 1.14.1 - -
Linuxbrew subversion@1.8 1.8.19 Potentially vulnerable - -
MacPorts subversion 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-javahlbindings 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-perlbindings-5.28 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-perlbindings-5.30 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-perlbindings-5.32 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-rubybindings 1.14.1 devel nomaintainer@macports.org
MacPorts subversion-python27bindings 1.13.0 Potentially vulnerable devel nomaintainer@macports.org
Maemo Fremantle subversion 1.6.16 Potentially vulnerable - keks9n@gmail.com
Mageia 7
core/updates
subversion 1.10.7 Development/Tools -
Mageia 7
core/updates
subversion 1.10.6 Potentially vulnerable Development/Tools -
Mageia 7
core/release
subversion 1.10.4 Potentially vulnerable Development/Tools -
Mageia 8
core/release
subversion 1.14.1 Development/Tools -
Mageia 8
core/updates
subversion 1.14.1 Development/Tools -
Mageia Cauldron
core/release
subversion 1.14.1 Development/Tools -
Manjaro Stable
extra
subversion 1.14.1 - -
Manjaro Testing
extra
subversion 1.14.1 - -
Manjaro Unstable
extra
subversion 1.14.1 - -
MidnightBSD mports devel/subversion 1.14.1 devel -
MidnightBSD mports devel/py-subversion 1.14.1 devel -
MidnightBSD mports www/mod_dav_svn 1.14.1 devel -
MidnightBSD mports devel/p5-subversion 1.14.1 devel -
MidnightBSD mports devel/subversion-lts 1.10.7 devel -
MidnightBSD mports devel/py-subversion 1.10.7 devel -
MSYS2 msys2
x86_64
subversion 1.14.0 Potentially vulnerable VCS -
MSYS2 msys2
i686
subversion 1.14.0 Potentially vulnerable VCS -
nixpkgs stable subversion-client 1.14.1 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs stable subversion 1.14.1 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs stable subversion 1.14.1 apacheHttpdPackages edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs stable subversion 1.10.7 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs unstable subversion 1.14.1 apacheHttpdPackages edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs unstable subversion 1.14.1 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs unstable subversion-client 1.14.1 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
nixpkgs unstable subversion 1.10.7 - edolstra+nixpkgs@gmail.com, jason@oconal.id.au
Npackd Stable Subversion 1.14.1 Development -
Npackd Stable Subversion 1.12 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.7 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.6 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.5 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.4 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.3 Potentially vulnerable Development -
Npackd Stable Subversion 1.9.2 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.13 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.11 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.10 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.9 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.5.1 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.4 Potentially vulnerable Development -
Npackd Stable Subversion 1.8.3 Potentially vulnerable Development -
Npackd Stable Subversion 1.8 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.9 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.8 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.7 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.6 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.5 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.4 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.2 Potentially vulnerable Development -
Npackd Stable Subversion 1.7.1 Potentially vulnerable Development -
Npackd Stable Subversion 1.6.17 Potentially vulnerable Development -
Npackd Stable Subversion 1.6.16 Potentially vulnerable Development -
Npackd Stable Subversion 1.6.15 Potentially vulnerable Development -
Npackd Stable Subversion 1.6.13 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.14.1 Development -
Npackd Stable64 Subversion 64 bit 1.12 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.7 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.6 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.5 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.4 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.3 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.9.2 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.13 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.11 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.10 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.9 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.5.1 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.4 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8.3 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.8 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.9 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.8 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.7 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.6 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.5 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.4 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.2 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.7.1 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.6.17 Potentially vulnerable Development -
Npackd Stable64 Subversion 64 bit 1.6.16 Potentially vulnerable Development -
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
OpenBSD Ports devel/subversion 1.14.1 devel stsp@openbsd.org
openEuler 20.03
source
subversion 1.10.6 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
subversion 1.9.7 Potentially vulnerable Development/Source Code Management -
OpenIndiana packages
hipster
subversion 1.9.7 Potentially vulnerable Development/Source Code Management -
OpenIndiana packages
hipster
subversion 1.9.7 Potentially vulnerable Development/Source Code Management -
OpenIndiana packages
hipster
subversion 1.9.7 Potentially vulnerable Development/Source Code Management -
openmamba
devel
subversion 1.14.1 Development/Tools silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
subversion 1.12.0 Potentially vulnerable Development/Tools nobodydead@gmail.com
OpenMandriva Cooker
main/release
subversion 1.14.1 Development/Tools bero+massbuild@lindev.ch
OpenMandriva Cooker
main/release
subversion 1.14.0 Potentially vulnerable Development/Tools bero@lindev.ch
OpenPKG subversion-apache 1.14.1 SCM -
OpenPKG subversion 1.14.1 SCM -
OpenPKG subversion-perl 1.14.1 SCM -
OpenPKG subversion-libs 1.14.1 SCM -
OpenPKG subversion-python 1.14.0 Potentially vulnerable SCM -
OpenPKG subversion-cvs 1.6.12 Potentially vulnerable SCM -
openSUSE Leap 42.3
updates/oss
subversion 1.9.7 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 42.3
main/oss
subversion 1.9.5 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.0
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.0
main/oss
subversion 1.10.0 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.0
updates/oss
subversion 1.10.0 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.1
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.1
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.1
main/oss
subversion 1.10.0 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.2
main/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.2
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.2
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.2
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.2
updates/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Leap 15.3
main/oss
subversion 1.10.6 Potentially vulnerable Development/Tools/Version Control -
openSUSE Tumbleweed
src-oss
subversion 1.14.1 Unspecified -
OpenWrt 17.01 x86_64
packages
subversion-client 1.9.5 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 17.01 x86_64
packages
subversion-libs 1.9.5 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 17.01 x86_64
packages
subversion-server 1.9.5 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 18.06 x86_64
packages
subversion-client 1.10.6 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 18.06 x86_64
packages
subversion-libs 1.10.6 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 18.06 x86_64
packages
subversion-server 1.10.6 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 19.07 x86_64
packages
subversion-client 1.12.2 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 19.07 x86_64
packages
subversion-libs 1.12.2 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 19.07 x86_64
packages
subversion-server 1.12.2 Potentially vulnerable net val.kulkov@gmail.com
OpenWrt 21.02 x86_64
packages
subversion-client 1.14.1 net val.kulkov@gmail.com
OpenWrt 21.02 x86_64
packages
subversion-libs 1.14.1 net val.kulkov@gmail.com
OpenWrt 21.02 x86_64
packages
subversion-server 1.14.1 net val.kulkov@gmail.com
OS4Depot subversion 1.1.4-1.7 Potentially vulnerable development/utility -
Parabola
extra
subversion 1.14.1 - -
Pardus 17
main
subversion 1.9.5 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org
Pardus 17
updates/main
subversion 1.9.5 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org
Pardus 17
updates/main
subversion 1.9.5 Potentially vulnerable vcs peter@p12n.org, jamessan@debian.org
Pardus 19
main
subversion 1.10.4 Potentially vulnerable vcs jamessan@debian.org
Pardus 19
updates/main
subversion 1.10.4 Potentially vulnerable vcs jamessan@debian.org
Pardus 21
main
subversion 1.14.1 vcs jamessan@debian.org
Parrot
main
subversion 1.14.1 vcs jamessan@debian.org
PCLinuxOS subversion 1.8.10 Potentially vulnerable Development/Other -
Pisi Linux
main
subversion 1.14.1 app:console admins@pisilinux.org
pkgsrc current devel/py-subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current www/ap2-subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current devel/java-subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current devel/p5-subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current devel/ruby-subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current devel/subversion 1.14.1 devel pkgsrc-users@netbsd.org
pkgsrc current devel/subversion-base 1.14.1 devel pkgsrc-users@netbsd.org
PLD Linux subversion 1.14.1 - -
PureOS Amber subversion 1.10.4 Potentially vulnerable misc jamessan@debian.org
PureOS Amber subversion 1.10.4 Potentially vulnerable misc jamessan@debian.org
PureOS landing subversion 1.14.1 misc jamessan@debian.org
Raspbian Oldstable
main
subversion 1.10.4 Potentially vulnerable vcs jamessan@debian.org
Raspbian Stable
main
subversion 1.14.1 vcs jamessan@debian.org
Raspbian Testing
main
subversion 1.14.1 vcs jamessan@debian.org
Ravenports subversion 1.14.1 devel fallback-mnt-ravenports@repology
Ravenports perl-subversion 1.14.1 devel fallback-mnt-ravenports@repology
Rocky Linux 8
AppStream
subversion 1.14.1 Unspecified infrastructure@rockylinux.org
Rocky Linux 8
AppStream
subversion 1.10.2 Potentially vulnerable Development/Tools infrastructure@rockylinux.org
Rosa 2014.1
main/updates
subversion 1.8.17 Potentially vulnerable - -
Rosa 2014.1
main/release
subversion 1.8.9 Potentially vulnerable - -
Rosa 2016.1
main/updates
subversion 1.9.12 Potentially vulnerable - -
Rosa 2016.1
main/release
subversion 1.9.5 Potentially vulnerable - -
Rosa 2019.1
main/release
subversion 1.13.0 Potentially vulnerable Development/Tools m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
subversion 1.6.11 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
subversion 1.6.11 Potentially vulnerable Development/Tools andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
subversion 1.7.14 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
subversion 1.7.14 Potentially vulnerable Development/Tools alex2048@mail.ru
Rosa Server 7.5
base/release
subversion 1.7.14 Potentially vulnerable Development/Tools alex2048@mail.ru
Sabayon www-apache/mod_dav_svn 1.14.0 Potentially vulnerable www-apache fallback-mnt-sabayon@repology
Sabayon dev-vcs/subversion 1.12.2 Potentially vulnerable dev-vcs fallback-mnt-sabayon@repology
Sabayon www-apache/mod_dav_svn 1.12.2 Potentially vulnerable www-apache fallback-mnt-sabayon@repology
Sabayon dev-vcs/subversion 1.12.0 Potentially vulnerable dev-vcs fallback-mnt-sabayon@repology
Sabayon www-apache/mod_dav_svn 1.12.0 Potentially vulnerable www-apache fallback-mnt-sabayon@repology
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.14 Potentially vulnerable Development/Tools -
Scientific Linux 7.x subversion 1.7.13 Potentially vulnerable Development/Tools -
Software Collections
subversion19
sclo-subversion19-subversion 1.9.3 Potentially vulnerable Development/Tools cbs@centos.org
Software Collections
subversion19
sclo-subversion19-subversion 1.9.3 Potentially vulnerable Development/Tools cbs@centos.org
Software Collections
subversion19
sclo-subversion19-subversion 1.9.3 Potentially vulnerable Development/Tools cbs@centos.org
Slackware 14.2
patches
subversion 1.9.7 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
subversion 1.9.4 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
subversion 1.14.1 - volkerdi@slackware.com
Slackware64 14.2
patches
subversion 1.9.7 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
subversion 1.9.4 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
subversion 1.14.1 - volkerdi@slackware.com
Slackwarearm 14.2
patches
subversion 1.9.7 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
subversion 1.9.4 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
subversion 1.14.1 - volkerdi@slackware.com
SliTaz Cooking subversion 1.13.0 Potentially vulnerable development lehswe@gmail.com
SliTaz Cooking libsvn 1.13.0 Potentially vulnerable system-tools lehswe@gmail.com
SliTaz Cooking subversion-dev 1.13.0 Potentially vulnerable development lehswe@gmail.com
SliTaz Next libsvn 1.9.7 Potentially vulnerable libdevel devel@slitaz.org
SliTaz Next subversion 1.9.7 Potentially vulnerable development devel@slitaz.org
SliTaz Next subversion-dev 1.9.7 Potentially vulnerable development devel@slitaz.org
Solus subversion 1.14.0 Potentially vulnerable programming.tools flinux@vongellhorn.ch
Solus subversion-dbginfo 1.14.0 Potentially vulnerable debug flinux@vongellhorn.ch
Solus subversion-devel 1.14.0 Potentially vulnerable programming.devel flinux@vongellhorn.ch
Spack subversion 1.14.0 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE subversion 1.14.1 extra/server extra/development rene@t2-project.org
Termux subversion 1.14.1 - termux@termux
Trisquel 6.0
toutatis/main
subversion 1.6.17 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, gpastore@debian.org, troyh@debian.org
Trisquel 6.0
toutatis-updates/main
subversion 1.6.17 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, gpastore@debian.org, troyh@debian.org
Trisquel 7.0
belenos-updates/main
subversion 1.8.8 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org, troyh@debian.org
Trisquel 7.0
belenos/main
subversion 1.8.8 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org, troyh@debian.org
Trisquel 8.0
flidas/main
subversion 1.9.3 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org
Trisquel 8.0
flidas-updates/main
subversion 1.9.3 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org
Trisquel 9.0
etiona/main
subversion 1.9.7 Potentially vulnerable universe/devel ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 14.04
trusty/main
subversion 1.8.8 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org, troyh@debian.org
Ubuntu 14.04
trusty-updates/main
subversion 1.8.8 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org, troyh@debian.org
Ubuntu 16.04
xenial/main
subversion 1.9.3 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org
Ubuntu 16.04
xenial-updates/main
subversion 1.9.3 Potentially vulnerable devel ubuntu-devel-discuss@lists.ubuntu.com, jamessan@debian.org
Ubuntu 18.04
bionic/universe
subversion 1.9.7 Potentially vulnerable universe/devel ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/universe
subversion 1.13.0 Potentially vulnerable universe/devel jamessan@debian.org
Ubuntu 20.10
groovy/universe
subversion 1.14.0 Potentially vulnerable universe/devel jamessan@debian.org
Ubuntu 21.04
hirsute/universe
subversion 1.14.1 universe/devel jamessan@debian.org
Void Linux x86_64
x86_64
subversion 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-apache 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-devel 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-gnome-keyring-auth 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-kwallet-auth 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-perl 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
subversion-python 1.14.1 - chocimier@tlen.pl
Void Linux x86_64
x86_64
libsvn 1.14.1 - chocimier@tlen.pl
Wikidata Subversion 1.14.1 - -