Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0715 (GCVE-0-2011-0715)
Vulnerability from cvelistv5
Published
2011-03-11 22:00
Modified
2024-08-06 22:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:52.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025161", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025161" }, { "name": "MDVSA-2011:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "USN-1096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "ADV-2011-0567", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "43583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43583" }, { "name": "46734", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46734" }, { "name": "FEDORA-2011-2657", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "oval:org.mitre.oval:def:18967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "name": "ADV-2011-0568", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSA:2011-070-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "DSA-2181", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "RHSA-2011:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "ADV-2011-0776", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "ADV-2011-0660", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "FEDORA-2011-2698", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "FEDORA-2011-3775", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "RHSA-2011:0328", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "ADV-2011-0684", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "subversion-moddavsvn-dos(65876)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "name": "[dev] 20110303 Subversion 1.6.16 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "43794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43794" }, { "name": "ADV-2011-0885", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "ADV-2011-0624", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "43603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43603" }, { "name": "43672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43672" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "70964", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/70964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1025161", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025161" }, { "name": "MDVSA-2011:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "USN-1096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "ADV-2011-0567", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "43583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43583" }, { "name": "46734", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46734" }, { "name": "FEDORA-2011-2657", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "oval:org.mitre.oval:def:18967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "name": "ADV-2011-0568", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSA:2011-070-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "DSA-2181", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "RHSA-2011:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "ADV-2011-0776", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "ADV-2011-0660", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "FEDORA-2011-2698", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "FEDORA-2011-3775", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "RHSA-2011:0328", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "ADV-2011-0684", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "subversion-moddavsvn-dos(65876)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "name": "[dev] 20110303 Subversion 1.6.16 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "43794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43794" }, { "name": "ADV-2011-0885", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "ADV-2011-0624", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "43603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43603" }, { "name": "43672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43672" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "70964", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/70964" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0715", "datePublished": "2011-03-11T22:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T22:05:52.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-0715\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-03-11T22:55:05.650\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_dav_svn para el servidor Apache HTTP, como el distribuido en Apache Subversion antes de v1.6.16, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferenciar de puntero NULL y ca\u00edda de demonio) a trav\u00e9s de una solicitud que contiene un token de bloqueo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.15\",\"matchCriteriaId\":\"9FA7FA65-3F04-4215-B1CF-F29CEC9ACB6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB33539-0E47-4FBC-B509-A80CB0525B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CAF981-A3D6-4732-A291-FB50D91EE172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A88525-321D-4329-8B2C-2B912B0E13A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A498782-9837-4CFD-BFF2-684AAF8CF5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF7F7DF-DAB2-4456-9AFF-EA5DC6293115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58F83FD-604A-43E2-8310-B0133EB8CE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6E57BE-7D32-4838-9F1F-142F67ABB1A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6FB430-467A-499A-A231-3ABDC49CF989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC95E7E-69C2-40A4-A337-C8DCC2296773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"001D8708-8543-4CD8-9DD7-49304144BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F90085-6351-4792-8A5F-9B8F0AD66828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05583331-0A4A-405B-9B01-79E59CA6C6A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA872BC-38F1-482D-A23D-31BD195A9859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE048E8E-13FA-4487-8631-28449393F631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C287F1A7-6641-4005-8099-985BA1231619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC9B24B-100A-48B5-862A-6F6049F7E751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E02F3C-DF1F-49DE-8EF7-0AF1043C9EDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EC30E3-BB43-4DCB-A808-28E3A70559AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853D4C9E-21FC-4411-B85D-F0625B370286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE82629-5207-4E90-B80C-71D85A80DF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE78B8E-CA40-4ADE-99BA-E83E7F4C28F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E970D014-E037-46E0-BC4C-275EF1345036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4E3CD50-3ED8-4B2B-8526-E7F8FB23BB64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B216AE-069C-4A98-8F8C-ABFC3FFE2B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EBB65E0-E3D0-40E2-84EC-5210A482672A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B57B0B-BC24-442E-B9B5-7CA620687833\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59089857-7F61-4112-8757-666C8ED5674E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D19CA9A-081B-499E-B3DE-F5C5D05DB156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577C74A5-E87E-4ABE-8673-ECBFAB782A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3CF8AC-F42C-4365-944F-3BB99D090F86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE674329-C25B-442C-9057-035AF25F1B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C011BE5-E603-4EED-B1A5-B5DA935CEB86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6BE30C-E4D4-4A7F-8BA0-F25DE9F6348F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74421EC5-BD41-4F09-BBD3-7C5575B8A9A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E83DCB-0C73-4943-940D-355063A1F194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33F16C3-326D-4F6E-87EB-25872A735567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08E7421-BB83-41A7-9285-983165C2AC5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E55A2F-0CF6-4C9F-BC01-0041156F0D72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0A1C51-0684-4384-88C1-C7BDEB0413DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7379952-D4B6-4256-888D-F2CC2B05CB45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555DBBD-0366-40FA-A772-6722B4D2888A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803058ED-4566-4609-B250-7BA6AB6EE054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"933F4E36-4B89-4C3C-9FAA-7A757CBBA3FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A31BD1-325F-4BEA-9D2F-17611032B44F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69324D9E-7223-4AE2-A950-EA32925544F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00351004-8FE7-4C35-97B9-CA29BE5325E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2872908F-4656-4F6F-9950-64978CE0B533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6736466E-B29D-4E50-86BB-D3DD70AFA4B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E23F84-C03A-4E95-AD7D-F42F3478F786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B7EF4A-5989-4EE9-8747-7605D4C0C8CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638C8FFA-A26C-47B6-B9B2-A34B92639F2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7CBDEE8-5933-4468-AD9E-B63340353677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70A147D-EB27-4EF4-A1E4-6B1D24D33B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BB268C-C29B-4200-96AE-5133B2DC1095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4DFB08D-01C2-4D95-8EB2-81F5C27AC656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"106C86D0-84D9-4F44-821F-FD0D49EB32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"156DD5C1-C2C3-4AD7-B432-79CC3EC32B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75551DEC-A2BE-453D-9ABA-B3041A2607C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC70E13-59B6-4A75-9AF0-D38CCAB2D117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8316A374-3E3E-4FBA-AB57-9244812C8E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB42901-B207-4B41-B09C-91153A19C7D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3DA7ADC-6A81-4250-B6E1-4E4425156941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D766B5-5F07-44F1-A488-127D18510989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C8479EC-930C-47DB-9A02-E7B2F9101E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D47331-B23A-4A6E-8F14-74628F0E1846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E2C35C-FEBA-4525-8A38-9C170B34FA07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A098CEF5-04BE-48C0-8414-AFC9D03771E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39739A0-8C23-4167-B63D-1000F9D3B684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD13E19-4B9C-4DBD-9339-7BFE5377689F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D04C072-7D90-428F-A226-BAD0105D22B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856959BA-9945-4AA8-95D3-B3752C0D895D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13109084-931E-4565-BEE5-794B83E6978D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726B9C10-ACD5-41C2-A552-FD0046A75966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D72A75-EDB9-4AD1-B6FC-8A918804DE0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B55A7A26-C994-4956-BBE7-BF3A51971295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9E26AB-915A-477F-BA5C-10965A7098F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD49A9B-16A7-4362-8D62-6EB5ECBE4296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0CB798-F4ED-44E5-9B15-B7009EAC6303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67130DAF-AE81-43D2-A208-58A53746A7E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9F8426-38CB-46B4-B0D0-8D16B48DD53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90631FFA-9AB2-483D-B162-31A47428D280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD5A981-3FDD-4E74-8EB2-5F324246FFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"341F900B-5179-4CB4-9F41-91B58B29C414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34F463-6350-4F48-B037-856DDBB1A4FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C813BA-B8F9-446B-A07F-B51F26815578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF4080D-0D95-429E-88AA-1051A5520C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF50F098-A055-4B79-AC35-6BD6F32D70F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540461D4-87F4-42AB-ADDC-C7A067FE2893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E676744-C623-4894-8764-43588E56D2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669735D1-1C14-4CD7-AA7C-AD2CA63A1979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C568FD-54BC-4506-AF60-BFE7CE14D0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F71F24-D909-49D9-8B4F-FA757FDF1C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034D1C36-B73E-443E-A6B4-44CC6E7BC043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D373245-8384-45E4-BE2E-E0518BD7F84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED44413-D313-4588-9A4B-25F79D0925A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C193EB08-BBC2-43A2-B11A-9C7E2098862D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022A5BCE-A1DC-48E2-829D-AD9261562095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155F83A1-A04A-48C0-A801-B38F129F310F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEF93A5-5D53-4EA7-8865-CA0EABC18A89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023127A5-04AD-4725-85EB-3D08C08DFB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689E87D0-BAA7-420D-A700-C07376F312F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:m4\\\\/m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3073CF2-E398-408C-9782-702F83663557\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43583\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43603\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43672\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1025161\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://subversion.apache.org/security/CVE-2011-0715-advisory.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4723\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1071239\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1071307\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.haxx.se/dev/archive-2011-03/0122.shtml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2181\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:067\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/70964\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/46734\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1096-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0567\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0568\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0624\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0660\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0684\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0776\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0885\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=680755\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65876\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2011-0327.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2011-0328.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43583\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1025161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://subversion.apache.org/security/CVE-2011-0715-advisory.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1071239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?view=revision\u0026revision=1071307\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.haxx.se/dev/archive-2011-03/0122.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2181\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/70964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46734\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1096-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0684\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=680755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2011-0327.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2011-0328.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/476.html \\r\\n\u0027CWE-476: NULL Pointer Dereference\u0027\"}}" } }
gsd-2011-0715
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-0715", "description": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "id": "GSD-2011-0715", "references": [ "https://www.suse.com/security/cve/CVE-2011-0715.html", "https://www.debian.org/security/2011/dsa-2181", "https://access.redhat.com/errata/RHSA-2011:0328", "https://access.redhat.com/errata/RHSA-2011:0327", "https://linux.oracle.com/cve/CVE-2011-0715.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-0715" ], "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "id": "GSD-2011-0715", "modified": "2023-12-13T01:19:04.393072Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "MISC", "url": "http://support.apple.com/kb/HT4723" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "name": "http://secunia.com/advisories/43583", "refsource": "MISC", "url": "http://secunia.com/advisories/43583" }, { "name": "http://secunia.com/advisories/43603", "refsource": "MISC", "url": "http://secunia.com/advisories/43603" }, { "name": "http://secunia.com/advisories/43672", "refsource": "MISC", "url": "http://secunia.com/advisories/43672" }, { "name": "http://secunia.com/advisories/43794", "refsource": "MISC", "url": "http://secunia.com/advisories/43794" }, { "name": "http://securitytracker.com/id?1025161", "refsource": "MISC", "url": "http://securitytracker.com/id?1025161" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt", "refsource": "MISC", "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES", "refsource": "MISC", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239", "refsource": "MISC", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307", "refsource": "MISC", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml", "refsource": "MISC", "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "http://www.debian.org/security/2011/dsa-2181", "refsource": "MISC", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "name": "http://www.osvdb.org/70964", "refsource": "MISC", "url": "http://www.osvdb.org/70964" }, { "name": "http://www.securityfocus.com/bid/46734", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/46734" }, { "name": "http://www.ubuntu.com/usn/USN-1096-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "http://www.vupen.com/english/advisories/2011/0567", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "http://www.vupen.com/english/advisories/2011/0568", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "http://www.vupen.com/english/advisories/2011/0624", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "http://www.vupen.com/english/advisories/2011/0660", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "name": "http://www.vupen.com/english/advisories/2011/0684", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "http://www.vupen.com/english/advisories/2011/0776", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "http://www.vupen.com/english/advisories/2011/0885", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "name": "https://rhn.redhat.com/errata/RHSA-2011-0327.html", "refsource": "MISC", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "https://rhn.redhat.com/errata/RHSA-2011-0328.html", "refsource": "MISC", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680755", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0715" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "70964", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/70964" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=680755", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "name": "43603", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43603" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "[dev] 20110303 Subversion 1.6.16 Released", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "name": "46734", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/46734" }, { "name": "RHSA-2011:0328", "refsource": "REDHAT", "tags": [], "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "DSA-2181", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "ADV-2011-0567", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "1025161", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1025161" }, { "name": "RHSA-2011:0327", "refsource": "REDHAT", "tags": [], "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "ADV-2011-0624", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "ADV-2011-0568", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "43583", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43583" }, { "name": "43672", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43672" }, { "name": "SSA:2011-070-01", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "ADV-2011-0660", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "name": "ADV-2011-0684", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "43794", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/43794" }, { "name": "FEDORA-2011-3775", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "name": "ADV-2011-0776", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "USN-1096-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "ADV-2011-0885", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "MDVSA-2011:067", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT4723" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SUSE-SR:2011:005", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "FEDORA-2011-2698", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "FEDORA-2011-2657", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "subversion-moddavsvn-dos(65876)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "name": "oval:org.mitre.oval:def:18967", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-19T01:32Z", "publishedDate": "2011-03-11T22:55Z" } } }
rhsa-2011:0328
Vulnerability from csaf_redhat
Published
2011-03-08 17:57
Modified
2024-11-22 04:12
Summary
Red Hat Security Advisory: subversion security update
Notes
Topic
Updated subversion packages that fix one security issue are now available
for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access to
Subversion repositories via HTTP.
A NULL pointer dereference flaw was found in the way the mod_dav_svn module
processed certain requests to lock working copy paths in a repository. A
remote attacker could issue a lock request that could cause the httpd
process serving the request to crash. (CVE-2011-0715)
Red Hat would like to thank Hyrum Wright of the Apache Subversion project
for reporting this issue. Upstream acknowledges Philip Martin, WANdisco,
Inc. as the original reporter.
All Subversion users should upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, you must restart the httpd daemon, if you are using
mod_dav_svn, for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed certain requests to lock working copy paths in a repository. A\nremote attacker could issue a lock request that could cause the httpd\nprocess serving the request to crash. (CVE-2011-0715)\n\nRed Hat would like to thank Hyrum Wright of the Apache Subversion project\nfor reporting this issue. Upstream acknowledges Philip Martin, WANdisco,\nInc. as the original reporter.\n\nAll Subversion users should upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0328", "url": "https://access.redhat.com/errata/RHSA-2011:0328" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "680755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0328.json" } ], "title": "Red Hat Security Advisory: subversion security update", "tracking": { "current_release_date": "2024-11-22T04:12:35+00:00", "generator": { "date": "2024-11-22T04:12:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0328", "initial_release_date": "2011-03-08T17:57:00+00:00", "revision_history": [ { "date": "2011-03-08T17:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-08T12:58:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:12:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=i686" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "product_id": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_0.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_0.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.ppc64", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64", "product_id": "subversion-0:1.6.11-2.el6_0.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.ppc", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc", "product_id": "subversion-0:1.6.11-2.el6_0.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "product_id": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_0.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.s390x", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x", "product_id": "subversion-0:1.6.11-2.el6_0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_0.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.s390", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.s390", "product_id": "subversion-0:1.6.11-2.el6_0.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_0.3.src", "product": { "name": "subversion-0:1.6.11-2.el6_0.3.src", "product_id": "subversion-0:1.6.11-2.el6_0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_0.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "product": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "product_id": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-svn2cl@1.6.11-2.el6_0.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.src" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hyrum Wright" ], "organization": "Apache Subversion project" } ], "cve": "CVE-2011-0715", "discovery_date": "2011-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "680755" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.src", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-0:1.6.11-2.el6_0.3.src", "6Server:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0715" }, { "category": "external", "summary": "RHBZ#680755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0715", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0715" } ], "release_date": "2011-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-08T17:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.src", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-0:1.6.11-2.el6_0.3.src", "6Server:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0328" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Client-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Client-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Client-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.src", "6ComputeNode-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6ComputeNode-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6ComputeNode-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Server-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Server:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-0:1.6.11-2.el6_0.3.src", "6Server:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Server:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Server:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation-optional:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation-optional:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation-optional:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.i686", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.s390x", "6Workstation:mod_dav_svn-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-0:1.6.11-2.el6_0.3.src", "6Workstation:subversion-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-debuginfo-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-devel-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-gnome-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-javahl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-kde-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-perl-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.i686", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.ppc64", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.s390x", "6Workstation:subversion-ruby-0:1.6.11-2.el6_0.3.x86_64", "6Workstation:subversion-svn2cl-0:1.6.11-2.el6_0.3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client" } ] }
rhsa-2011:0327
Vulnerability from csaf_redhat
Published
2011-03-08 17:41
Modified
2024-11-22 04:12
Summary
Red Hat Security Advisory: subversion security and bug fix update
Notes
Topic
Updated subversion packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access to
Subversion repositories via HTTP.
A NULL pointer dereference flaw was found in the way the mod_dav_svn module
processed certain requests to lock working copy paths in a repository. A
remote attacker could issue a lock request that could cause the httpd
process serving the request to crash. (CVE-2011-0715)
Red Hat would like to thank Hyrum Wright of the Apache Subversion project
for reporting this issue. Upstream acknowledges Philip Martin, WANdisco,
Inc. as the original reporter.
This update also fixes the following bug:
* A regression was found in the handling of repositories which do not have
a "db/fsfs.conf" file. The "svnadmin hotcopy" command would fail when
trying to produce a copy of such a repository. This command has been fixed
to ignore the absence of the "fsfs.conf" file. The "svnadmin hotcopy"
command will now succeed for this type of repository. (BZ#681522)
All Subversion users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, you must restart the httpd daemon, if you are using
mod_dav_svn, for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix one security issue and one bug are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed certain requests to lock working copy paths in a repository. A\nremote attacker could issue a lock request that could cause the httpd\nprocess serving the request to crash. (CVE-2011-0715)\n\nRed Hat would like to thank Hyrum Wright of the Apache Subversion project\nfor reporting this issue. Upstream acknowledges Philip Martin, WANdisco,\nInc. as the original reporter.\n\nThis update also fixes the following bug:\n\n* A regression was found in the handling of repositories which do not have\na \"db/fsfs.conf\" file. The \"svnadmin hotcopy\" command would fail when\ntrying to produce a copy of such a repository. This command has been fixed\nto ignore the absence of the \"fsfs.conf\" file. The \"svnadmin hotcopy\"\ncommand will now succeed for this type of repository. (BZ#681522)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0327", "url": "https://access.redhat.com/errata/RHSA-2011:0327" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "680755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "category": "external", "summary": "681522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681522" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0327.json" } ], "title": "Red Hat Security Advisory: subversion security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:12:31+00:00", "generator": { "date": "2024-11-22T04:12:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0327", "initial_release_date": "2011-03-08T17:41:00+00:00", "revision_history": [ { "date": "2011-03-08T17:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-08T12:43:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:12:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-perl-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.ppc64", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.ppc64", "product_id": "subversion-0:1.6.11-7.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-perl-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.s390", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.s390", "product_id": "subversion-0:1.6.11-7.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=s390" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-devel-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-perl-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.3.i386", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.i386", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.3.src", "product": { "name": "subversion-0:1.6.11-7.el5_6.3.src", "product_id": "subversion-0:1.6.11-7.el5_6.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.3?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.src" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.i386" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ia64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hyrum Wright" ], "organization": "Apache Subversion project" } ], "cve": "CVE-2011-0715", "discovery_date": "2011-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "680755" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0715" }, { "category": "external", "summary": "RHBZ#680755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0715", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0715" } ], "release_date": "2011-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-08T17:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0327" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.3.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client" } ] }
fkie_cve-2011-0715
Vulnerability from fkie_nvd
Published
2011-03-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html | ||
secalert@redhat.com | http://secunia.com/advisories/43583 | ||
secalert@redhat.com | http://secunia.com/advisories/43603 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/43672 | ||
secalert@redhat.com | http://secunia.com/advisories/43794 | ||
secalert@redhat.com | http://securitytracker.com/id?1025161 | ||
secalert@redhat.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.479953 | ||
secalert@redhat.com | http://subversion.apache.org/security/CVE-2011-0715-advisory.txt | Vendor Advisory | |
secalert@redhat.com | http://support.apple.com/kb/HT4723 | ||
secalert@redhat.com | http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES | ||
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1071239 | ||
secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1071307 | Patch | |
secalert@redhat.com | http://svn.haxx.se/dev/archive-2011-03/0122.shtml | Patch | |
secalert@redhat.com | http://www.debian.org/security/2011/dsa-2181 | ||
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:067 | ||
secalert@redhat.com | http://www.osvdb.org/70964 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/46734 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1096-1 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0567 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0568 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0624 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0660 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0684 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0776 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0885 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=680755 | Patch | |
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65876 | ||
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967 | ||
secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2011-0327.html | ||
secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2011-0328.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43603 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43672 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43794 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.479953 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2011-0715-advisory.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4723 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1071239 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1071307 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://svn.haxx.se/dev/archive-2011-03/0122.shtml | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2181 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:067 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/70964 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46734 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1096-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0567 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0568 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0624 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0660 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0684 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0776 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0885 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=680755 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65876 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2011-0327.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2011-0328.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 0.6 | |
apache | subversion | 0.7 | |
apache | subversion | 0.8 | |
apache | subversion | 0.9 | |
apache | subversion | 0.10.0 | |
apache | subversion | 0.10.1 | |
apache | subversion | 0.10.2 | |
apache | subversion | 0.11.1 | |
apache | subversion | 0.12.0 | |
apache | subversion | 0.13.0 | |
apache | subversion | 0.13.1 | |
apache | subversion | 0.13.2 | |
apache | subversion | 0.14.0 | |
apache | subversion | 0.14.1 | |
apache | subversion | 0.14.2 | |
apache | subversion | 0.14.3 | |
apache | subversion | 0.14.4 | |
apache | subversion | 0.14.5 | |
apache | subversion | 0.15 | |
apache | subversion | 0.16 | |
apache | subversion | 0.16.1 | |
apache | subversion | 0.17.0 | |
apache | subversion | 0.17.1 | |
apache | subversion | 0.18.0 | |
apache | subversion | 0.18.1 | |
apache | subversion | 0.19.0 | |
apache | subversion | 0.19.1 | |
apache | subversion | 0.20.0 | |
apache | subversion | 0.20.1 | |
apache | subversion | 0.21.0 | |
apache | subversion | 0.22.0 | |
apache | subversion | 0.22.1 | |
apache | subversion | 0.22.2 | |
apache | subversion | 0.23.0 | |
apache | subversion | 0.24.0 | |
apache | subversion | 0.24.1 | |
apache | subversion | 0.24.2 | |
apache | subversion | 0.25.0 | |
apache | subversion | 0.26.0 | |
apache | subversion | 0.27.0 | |
apache | subversion | 0.28.0 | |
apache | subversion | 0.28.1 | |
apache | subversion | 0.28.2 | |
apache | subversion | 0.29.0 | |
apache | subversion | 0.30.0 | |
apache | subversion | 0.31.0 | |
apache | subversion | 0.32.1 | |
apache | subversion | 0.33.0 | |
apache | subversion | 0.33.1 | |
apache | subversion | 0.34.0 | |
apache | subversion | 0.35.0 | |
apache | subversion | 0.35.1 | |
apache | subversion | 0.36.0 | |
apache | subversion | 0.37.0 | |
apache | subversion | 1.0.0 | |
apache | subversion | 1.0.1 | |
apache | subversion | 1.0.2 | |
apache | subversion | 1.0.3 | |
apache | subversion | 1.0.4 | |
apache | subversion | 1.0.5 | |
apache | subversion | 1.0.6 | |
apache | subversion | 1.0.7 | |
apache | subversion | 1.0.8 | |
apache | subversion | 1.0.9 | |
apache | subversion | 1.1.0 | |
apache | subversion | 1.1.1 | |
apache | subversion | 1.1.2 | |
apache | subversion | 1.1.3 | |
apache | subversion | 1.1.4 | |
apache | subversion | 1.2.0 | |
apache | subversion | 1.2.1 | |
apache | subversion | 1.2.2 | |
apache | subversion | 1.2.3 | |
apache | subversion | 1.3.0 | |
apache | subversion | 1.3.1 | |
apache | subversion | 1.3.2 | |
apache | subversion | 1.4.0 | |
apache | subversion | 1.4.1 | |
apache | subversion | 1.4.2 | |
apache | subversion | 1.4.3 | |
apache | subversion | 1.4.4 | |
apache | subversion | 1.4.5 | |
apache | subversion | 1.4.6 | |
apache | subversion | 1.5.0 | |
apache | subversion | 1.5.1 | |
apache | subversion | 1.5.2 | |
apache | subversion | 1.5.3 | |
apache | subversion | 1.5.4 | |
apache | subversion | 1.5.5 | |
apache | subversion | 1.5.6 | |
apache | subversion | 1.5.7 | |
apache | subversion | 1.5.8 | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | m1 | |
apache | subversion | m2 | |
apache | subversion | m3 | |
apache | subversion | m4\/m5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FA7FA65-3F04-4215-B1CF-F29CEC9ACB6F", "versionEndIncluding": "1.6.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3BB33539-0E47-4FBC-B509-A80CB0525B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "41CAF981-A3D6-4732-A291-FB50D91EE172", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "62A88525-321D-4329-8B2C-2B912B0E13A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7A498782-9837-4CFD-BFF2-684AAF8CF5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BF7F7DF-DAB2-4456-9AFF-EA5DC6293115", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B58F83FD-604A-43E2-8310-B0133EB8CE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F6E57BE-7D32-4838-9F1F-142F67ABB1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD6FB430-467A-499A-A231-3ABDC49CF989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC95E7E-69C2-40A4-A337-C8DCC2296773", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "001D8708-8543-4CD8-9DD7-49304144BA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "05F90085-6351-4792-8A5F-9B8F0AD66828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "05583331-0A4A-405B-9B01-79E59CA6C6A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DA872BC-38F1-482D-A23D-31BD195A9859", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE048E8E-13FA-4487-8631-28449393F631", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "C287F1A7-6641-4005-8099-985BA1231619", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EC9B24B-100A-48B5-862A-6F6049F7E751", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0E02F3C-DF1F-49DE-8EF7-0AF1043C9EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "63EC30E3-BB43-4DCB-A808-28E3A70559AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "853D4C9E-21FC-4411-B85D-F0625B370286", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8BE82629-5207-4E90-B80C-71D85A80DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78B8E-CA40-4ADE-99BA-E83E7F4C28F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "E970D014-E037-46E0-BC4C-275EF1345036", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4E3CD50-3ED8-4B2B-8526-E7F8FB23BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B216AE-069C-4A98-8F8C-ABFC3FFE2B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EBB65E0-E3D0-40E2-84EC-5210A482672A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "06B57B0B-BC24-442E-B9B5-7CA620687833", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "59089857-7F61-4112-8757-666C8ED5674E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D19CA9A-081B-499E-B3DE-F5C5D05DB156", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "577C74A5-E87E-4ABE-8673-ECBFAB782A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A3CF8AC-F42C-4365-944F-3BB99D090F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE674329-C25B-442C-9057-035AF25F1B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C011BE5-E603-4EED-B1A5-B5DA935CEB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D6BE30C-E4D4-4A7F-8BA0-F25DE9F6348F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "74421EC5-BD41-4F09-BBD3-7C5575B8A9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0E83DCB-0C73-4943-940D-355063A1F194", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "F33F16C3-326D-4F6E-87EB-25872A735567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "B08E7421-BB83-41A7-9285-983165C2AC5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "59E55A2F-0CF6-4C9F-BC01-0041156F0D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E0A1C51-0684-4384-88C1-C7BDEB0413DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7379952-D4B6-4256-888D-F2CC2B05CB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "6555DBBD-0366-40FA-A772-6722B4D2888A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "803058ED-4566-4609-B250-7BA6AB6EE054", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "933F4E36-4B89-4C3C-9FAA-7A757CBBA3FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A31BD1-325F-4BEA-9D2F-17611032B44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "69324D9E-7223-4AE2-A950-EA32925544F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "00351004-8FE7-4C35-97B9-CA29BE5325E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "2872908F-4656-4F6F-9950-64978CE0B533", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6736466E-B29D-4E50-86BB-D3DD70AFA4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "70E23F84-C03A-4E95-AD7D-F42F3478F786", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0B7EF4A-5989-4EE9-8747-7605D4C0C8CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "638C8FFA-A26C-47B6-B9B2-A34B92639F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7CBDEE8-5933-4468-AD9E-B63340353677", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "C70A147D-EB27-4EF4-A1E4-6B1D24D33B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BB268C-C29B-4200-96AE-5133B2DC1095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "matchCriteriaId": "ADEF93A5-5D53-4EA7-8865-CA0EABC18A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "matchCriteriaId": "023127A5-04AD-4725-85EB-3D08C08DFB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "matchCriteriaId": "689E87D0-BAA7-420D-A700-C07376F312F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "matchCriteriaId": "D3073CF2-E398-408C-9782-702F83663557", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para el servidor Apache HTTP, como el distribuido en Apache Subversion antes de v1.6.16, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferenciar de puntero NULL y ca\u00edda de demonio) a trav\u00e9s de una solicitud que contiene un token de bloqueo." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-0715", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-11T22:55:05.650", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43583" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43603" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43672" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43794" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025161" }, { "source": "secalert@redhat.com", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT4723" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/70964" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46734" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/70964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-gvp9-hg34-593w
Vulnerability from github
Published
2022-05-17 01:01
Modified
2022-05-17 01:01
VLAI Severity ?
Details
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
{ "affected": [], "aliases": [ "CVE-2011-0715" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-03-11T22:55:00Z", "severity": "MODERATE" }, "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "id": "GHSA-gvp9-hg34-593w", "modified": "2022-05-17T01:01:54Z", "published": "2022-05-17T01:01:54Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0715" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/43583" }, { "type": "WEB", "url": "http://secunia.com/advisories/43603" }, { "type": "WEB", "url": "http://secunia.com/advisories/43672" }, { "type": "WEB", "url": "http://secunia.com/advisories/43794" }, { "type": "WEB", "url": "http://securitytracker.com/id?1025161" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "type": "WEB", "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4723" }, { "type": "WEB", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "type": "WEB", "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "type": "WEB", "url": "http://www.osvdb.org/70964" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/46734" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0885" } ], "schema_version": "1.4.0", "severity": [] }
opensuse-su-2024:10538-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media
Notes
Title of the patch
libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10538
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10538", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10538-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-2411 page", "url": "https://www.suse.com/security/cve/CVE-2009-2411/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3315 page", "url": "https://www.suse.com/security/cve/CVE-2010-3315/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-4539 page", "url": "https://www.suse.com/security/cve/CVE-2010-4539/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-4644 page", "url": "https://www.suse.com/security/cve/CVE-2010-4644/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0715 page", "url": "https://www.suse.com/security/cve/CVE-2011-0715/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1752 page", "url": "https://www.suse.com/security/cve/CVE-2011-1752/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1783 page", "url": "https://www.suse.com/security/cve/CVE-2011-1783/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1921 page", "url": "https://www.suse.com/security/cve/CVE-2011-1921/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1845 page", "url": "https://www.suse.com/security/cve/CVE-2013-1845/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1846 page", "url": "https://www.suse.com/security/cve/CVE-2013-1846/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1847 page", "url": "https://www.suse.com/security/cve/CVE-2013-1847/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1849 page", "url": "https://www.suse.com/security/cve/CVE-2013-1849/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1884 page", "url": "https://www.suse.com/security/cve/CVE-2013-1884/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1968 page", "url": "https://www.suse.com/security/cve/CVE-2013-1968/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2088 page", "url": "https://www.suse.com/security/cve/CVE-2013-2088/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2112 page", "url": "https://www.suse.com/security/cve/CVE-2013-2112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4131 page", "url": "https://www.suse.com/security/cve/CVE-2013-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4246 page", "url": "https://www.suse.com/security/cve/CVE-2013-4246/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4262 page", "url": "https://www.suse.com/security/cve/CVE-2013-4262/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4277 page", "url": "https://www.suse.com/security/cve/CVE-2013-4277/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4505 page", "url": "https://www.suse.com/security/cve/CVE-2013-4505/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4558 page", "url": "https://www.suse.com/security/cve/CVE-2013-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0032 page", "url": "https://www.suse.com/security/cve/CVE-2014-0032/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3522 page", "url": "https://www.suse.com/security/cve/CVE-2014-3522/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3528 page", "url": "https://www.suse.com/security/cve/CVE-2014-3528/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3580 page", "url": "https://www.suse.com/security/cve/CVE-2014-3580/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8108 page", "url": "https://www.suse.com/security/cve/CVE-2014-8108/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0202 page", "url": "https://www.suse.com/security/cve/CVE-2015-0202/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0248 page", "url": "https://www.suse.com/security/cve/CVE-2015-0248/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0251 page", "url": "https://www.suse.com/security/cve/CVE-2015-0251/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3184 page", "url": "https://www.suse.com/security/cve/CVE-2015-3184/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3187 page", "url": "https://www.suse.com/security/cve/CVE-2015-3187/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5259 page", "url": "https://www.suse.com/security/cve/CVE-2015-5259/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5343 page", "url": "https://www.suse.com/security/cve/CVE-2015-5343/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2167 page", "url": "https://www.suse.com/security/cve/CVE-2016-2167/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2168 page", "url": "https://www.suse.com/security/cve/CVE-2016-2168/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8734 page", "url": "https://www.suse.com/security/cve/CVE-2016-8734/" } ], "title": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10538-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.aarch64", "product": { "name": "subversion-1.9.5-1.1.aarch64", "product_id": "subversion-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.aarch64", "product": { "name": "subversion-bash-completion-1.9.5-1.1.aarch64", "product_id": "subversion-bash-completion-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.aarch64", "product": { "name": "subversion-devel-1.9.5-1.1.aarch64", "product_id": "subversion-devel-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.aarch64", "product": { "name": "subversion-perl-1.9.5-1.1.aarch64", "product_id": "subversion-perl-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.aarch64", "product": { "name": "subversion-python-1.9.5-1.1.aarch64", "product_id": "subversion-python-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.aarch64", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.aarch64", "product_id": "subversion-python-ctypes-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.aarch64", "product": { "name": "subversion-ruby-1.9.5-1.1.aarch64", "product_id": "subversion-ruby-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.aarch64", "product": { "name": "subversion-server-1.9.5-1.1.aarch64", "product_id": "subversion-server-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.aarch64", "product": { "name": "subversion-tools-1.9.5-1.1.aarch64", "product_id": "subversion-tools-1.9.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.ppc64le", "product": { "name": "subversion-1.9.5-1.1.ppc64le", "product_id": "subversion-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.ppc64le", "product": { "name": "subversion-bash-completion-1.9.5-1.1.ppc64le", "product_id": "subversion-bash-completion-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.ppc64le", "product": { "name": "subversion-devel-1.9.5-1.1.ppc64le", "product_id": "subversion-devel-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.ppc64le", "product": { "name": "subversion-perl-1.9.5-1.1.ppc64le", "product_id": "subversion-perl-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.ppc64le", "product": { "name": "subversion-python-1.9.5-1.1.ppc64le", "product_id": "subversion-python-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "product_id": "subversion-python-ctypes-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.ppc64le", "product": { "name": "subversion-ruby-1.9.5-1.1.ppc64le", "product_id": "subversion-ruby-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.ppc64le", "product": { "name": "subversion-server-1.9.5-1.1.ppc64le", "product_id": "subversion-server-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.ppc64le", "product": { "name": "subversion-tools-1.9.5-1.1.ppc64le", "product_id": "subversion-tools-1.9.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.s390x", "product": { "name": "subversion-1.9.5-1.1.s390x", "product_id": "subversion-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.s390x", "product": { "name": "subversion-bash-completion-1.9.5-1.1.s390x", "product_id": "subversion-bash-completion-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.s390x", "product": { "name": "subversion-devel-1.9.5-1.1.s390x", "product_id": "subversion-devel-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.s390x", "product": { "name": "subversion-perl-1.9.5-1.1.s390x", "product_id": "subversion-perl-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.s390x", "product": { "name": "subversion-python-1.9.5-1.1.s390x", "product_id": "subversion-python-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.s390x", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.s390x", "product_id": "subversion-python-ctypes-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.s390x", "product": { "name": "subversion-ruby-1.9.5-1.1.s390x", "product_id": "subversion-ruby-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.s390x", "product": { "name": "subversion-server-1.9.5-1.1.s390x", "product_id": "subversion-server-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.s390x", "product": { "name": "subversion-tools-1.9.5-1.1.s390x", "product_id": "subversion-tools-1.9.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.x86_64", "product": { "name": "subversion-1.9.5-1.1.x86_64", "product_id": "subversion-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.x86_64", "product": { "name": "subversion-bash-completion-1.9.5-1.1.x86_64", "product_id": "subversion-bash-completion-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.x86_64", "product": { "name": "subversion-devel-1.9.5-1.1.x86_64", "product_id": "subversion-devel-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.x86_64", "product": { "name": "subversion-perl-1.9.5-1.1.x86_64", "product_id": "subversion-perl-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.x86_64", "product": { "name": "subversion-python-1.9.5-1.1.x86_64", "product_id": "subversion-python-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.x86_64", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.x86_64", "product_id": "subversion-python-ctypes-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.x86_64", "product": { "name": "subversion-ruby-1.9.5-1.1.x86_64", "product_id": "subversion-ruby-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.x86_64", "product": { "name": "subversion-server-1.9.5-1.1.x86_64", "product_id": "subversion-server-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.x86_64", "product": { "name": "subversion-tools-1.9.5-1.1.x86_64", "product_id": "subversion-tools-1.9.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64" }, "product_reference": "subversion-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x" }, "product_reference": "subversion-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64" }, "product_reference": "subversion-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64" }, "product_reference": "subversion-devel-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-devel-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x" }, "product_reference": "subversion-devel-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64" }, "product_reference": "subversion-devel-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64" }, "product_reference": "subversion-perl-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-perl-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x" }, "product_reference": "subversion-perl-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64" }, "product_reference": "subversion-perl-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64" }, "product_reference": "subversion-python-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-python-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x" }, "product_reference": "subversion-python-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64" }, "product_reference": "subversion-python-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64" }, "product_reference": "subversion-ruby-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-ruby-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x" }, "product_reference": "subversion-ruby-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64" }, "product_reference": "subversion-ruby-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64" }, "product_reference": "subversion-server-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-server-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x" }, "product_reference": "subversion-server-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64" }, "product_reference": "subversion-server-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64" }, "product_reference": "subversion-tools-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-tools-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x" }, "product_reference": "subversion-tools-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" }, "product_reference": "subversion-tools-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2411", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-2411" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-2411", "url": "https://www.suse.com/security/cve/CVE-2009-2411" }, { "category": "external", "summary": "SUSE Bug 528714 for CVE-2009-2411", "url": "https://bugzilla.suse.com/528714" }, { "category": "external", "summary": "SUSE Bug 802057 for CVE-2009-2411", "url": "https://bugzilla.suse.com/802057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-2411" }, { "cve": "CVE-2010-3315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3315" } ], "notes": [ { "category": "general", "text": "authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3315", "url": "https://www.suse.com/security/cve/CVE-2010-3315" }, { "category": "external", "summary": "SUSE Bug 649861 for CVE-2010-3315", "url": "https://bugzilla.suse.com/649861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3315" }, { "cve": "CVE-2010-4539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-4539" } ], "notes": [ { "category": "general", "text": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-4539", "url": "https://www.suse.com/security/cve/CVE-2010-4539" }, { "category": "external", "summary": "SUSE Bug 662030 for CVE-2010-4539", "url": "https://bugzilla.suse.com/662030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-4539" }, { "cve": "CVE-2010-4644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-4644" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-4644", "url": "https://www.suse.com/security/cve/CVE-2010-4644" }, { "category": "external", "summary": "SUSE Bug 662030 for CVE-2010-4644", "url": "https://bugzilla.suse.com/662030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-4644" }, { "cve": "CVE-2011-0715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0715" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0715", "url": "https://www.suse.com/security/cve/CVE-2011-0715" }, { "category": "external", "summary": "SUSE Bug 676949 for CVE-2011-0715", "url": "https://bugzilla.suse.com/676949" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0715" }, { "cve": "CVE-2011-1752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1752" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1752", "url": "https://www.suse.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1752", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1752" }, { "cve": "CVE-2011-1783", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1783" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1783", "url": "https://www.suse.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1783", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1783" }, { "cve": "CVE-2011-1921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1921" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1921", "url": "https://www.suse.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1921", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1921" }, { "cve": "CVE-2013-1845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1845" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1845", "url": "https://www.suse.com/security/cve/CVE-2013-1845" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1845", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-1845" }, { "cve": "CVE-2013-1846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1846" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1846", "url": "https://www.suse.com/security/cve/CVE-2013-1846" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1846", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-1846" }, { "cve": "CVE-2013-1847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1847" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1847", "url": "https://www.suse.com/security/cve/CVE-2013-1847" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1847", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1847" }, { "cve": "CVE-2013-1849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1849" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1849", "url": "https://www.suse.com/security/cve/CVE-2013-1849" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1849", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1849" }, { "cve": "CVE-2013-1884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1884" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1884", "url": "https://www.suse.com/security/cve/CVE-2013-1884" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1884", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1884" }, { "cve": "CVE-2013-1968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1968" } ], "notes": [ { "category": "general", "text": "Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1968", "url": "https://www.suse.com/security/cve/CVE-2013-1968" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-1968", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1968" }, { "cve": "CVE-2013-2088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2088" } ], "notes": [ { "category": "general", "text": "contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2088", "url": "https://www.suse.com/security/cve/CVE-2013-2088" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-2088", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2088" }, { "cve": "CVE-2013-2112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2112" } ], "notes": [ { "category": "general", "text": "The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2112", "url": "https://www.suse.com/security/cve/CVE-2013-2112" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-2112", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2112" }, { "cve": "CVE-2013-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4131" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4131", "url": "https://www.suse.com/security/cve/CVE-2013-4131" }, { "category": "external", "summary": "SUSE Bug 830031 for CVE-2013-4131", "url": "https://bugzilla.suse.com/830031" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4131" }, { "cve": "CVE-2013-4246", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4246" } ], "notes": [ { "category": "general", "text": "libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4246", "url": "https://www.suse.com/security/cve/CVE-2013-4246" }, { "category": "external", "summary": "SUSE Bug 836245 for CVE-2013-4246", "url": "https://bugzilla.suse.com/836245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4246" }, { "cve": "CVE-2013-4262", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4262" } ], "notes": [ { "category": "general", "text": "svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4262", "url": "https://www.suse.com/security/cve/CVE-2013-4262" }, { "category": "external", "summary": "SUSE Bug 844201 for CVE-2013-4262", "url": "https://bugzilla.suse.com/844201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4262" }, { "cve": "CVE-2013-4277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4277" } ], "notes": [ { "category": "general", "text": "Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4277", "url": "https://www.suse.com/security/cve/CVE-2013-4277" }, { "category": "external", "summary": "SUSE Bug 836245 for CVE-2013-4277", "url": "https://bugzilla.suse.com/836245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-4277" }, { "cve": "CVE-2013-4505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4505" } ], "notes": [ { "category": "general", "text": "The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4505", "url": "https://www.suse.com/security/cve/CVE-2013-4505" }, { "category": "external", "summary": "SUSE Bug 850667 for CVE-2013-4505", "url": "https://bugzilla.suse.com/850667" }, { "category": "external", "summary": "SUSE Bug 850747 for CVE-2013-4505", "url": "https://bugzilla.suse.com/850747" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2013-4505", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4505" }, { "cve": "CVE-2013-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4558" } ], "notes": [ { "category": "general", "text": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4558", "url": "https://www.suse.com/security/cve/CVE-2013-4558" }, { "category": "external", "summary": "SUSE Bug 850667 for CVE-2013-4558", "url": "https://bugzilla.suse.com/850667" }, { "category": "external", "summary": "SUSE Bug 850747 for CVE-2013-4558", "url": "https://bugzilla.suse.com/850747" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2013-4558", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4558" }, { "cve": "CVE-2014-0032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0032" } ], "notes": [ { "category": "general", "text": "The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the \"svn ls http://svn.example.com\" command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0032", "url": "https://www.suse.com/security/cve/CVE-2014-0032" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2014-0032", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0032" }, { "cve": "CVE-2014-3522", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3522" } ], "notes": [ { "category": "general", "text": "The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3522", "url": "https://www.suse.com/security/cve/CVE-2014-3522" }, { "category": "external", "summary": "SUSE Bug 890511 for CVE-2014-3522", "url": "https://bugzilla.suse.com/890511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-3522" }, { "cve": "CVE-2014-3528", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3528" } ], "notes": [ { "category": "general", "text": "Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3528", "url": "https://www.suse.com/security/cve/CVE-2014-3528" }, { "category": "external", "summary": "SUSE Bug 889849 for CVE-2014-3528", "url": "https://bugzilla.suse.com/889849" }, { "category": "external", "summary": "SUSE Bug 890511 for CVE-2014-3528", "url": "https://bugzilla.suse.com/890511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-3528" }, { "cve": "CVE-2014-3580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3580" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3580", "url": "https://www.suse.com/security/cve/CVE-2014-3580" }, { "category": "external", "summary": "SUSE Bug 909935 for CVE-2014-3580", "url": "https://bugzilla.suse.com/909935" }, { "category": "external", "summary": "SUSE Bug 910376 for CVE-2014-3580", "url": "https://bugzilla.suse.com/910376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3580" }, { "cve": "CVE-2014-8108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8108" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8108", "url": "https://www.suse.com/security/cve/CVE-2014-8108" }, { "category": "external", "summary": "SUSE Bug 909935 for CVE-2014-8108", "url": "https://bugzilla.suse.com/909935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8108" }, { "cve": "CVE-2015-0202", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0202" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0202", "url": "https://www.suse.com/security/cve/CVE-2015-0202" }, { "category": "external", "summary": "SUSE Bug 923793 for CVE-2015-0202", "url": "https://bugzilla.suse.com/923793" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-0202" }, { "cve": "CVE-2015-0248", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0248" } ], "notes": [ { "category": "general", "text": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0248", "url": "https://www.suse.com/security/cve/CVE-2015-0248" }, { "category": "external", "summary": "SUSE Bug 923794 for CVE-2015-0248", "url": "https://bugzilla.suse.com/923794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-0248" }, { "cve": "CVE-2015-0251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0251" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0251", "url": "https://www.suse.com/security/cve/CVE-2015-0251" }, { "category": "external", "summary": "SUSE Bug 923795 for CVE-2015-0251", "url": "https://bugzilla.suse.com/923795" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-0251" }, { "cve": "CVE-2015-3184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3184" } ], "notes": [ { "category": "general", "text": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3184", "url": "https://www.suse.com/security/cve/CVE-2015-3184" }, { "category": "external", "summary": "SUSE Bug 938723 for CVE-2015-3184", "url": "https://bugzilla.suse.com/938723" }, { "category": "external", "summary": "SUSE Bug 939514 for CVE-2015-3184", "url": "https://bugzilla.suse.com/939514" }, { "category": "external", "summary": "SUSE Bug 939516 for CVE-2015-3184", "url": "https://bugzilla.suse.com/939516" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3184" }, { "cve": "CVE-2015-3187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3187" } ], "notes": [ { "category": "general", "text": "The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3187", "url": "https://www.suse.com/security/cve/CVE-2015-3187" }, { "category": "external", "summary": "SUSE Bug 939517 for CVE-2015-3187", "url": "https://bugzilla.suse.com/939517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-3187" }, { "cve": "CVE-2015-5259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5259" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5259", "url": "https://www.suse.com/security/cve/CVE-2015-5259" }, { "category": "external", "summary": "SUSE Bug 958299 for CVE-2015-5259", "url": "https://bugzilla.suse.com/958299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5259" }, { "cve": "CVE-2015-5343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5343" } ], "notes": [ { "category": "general", "text": "Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5343", "url": "https://www.suse.com/security/cve/CVE-2015-5343" }, { "category": "external", "summary": "SUSE Bug 958300 for CVE-2015-5343", "url": "https://bugzilla.suse.com/958300" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5343" }, { "cve": "CVE-2016-2167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2167" } ], "notes": [ { "category": "general", "text": "The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2167", "url": "https://www.suse.com/security/cve/CVE-2016-2167" }, { "category": "external", "summary": "SUSE Bug 976849 for CVE-2016-2167", "url": "https://bugzilla.suse.com/976849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2167" }, { "cve": "CVE-2016-2168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2168" } ], "notes": [ { "category": "general", "text": "The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2168", "url": "https://www.suse.com/security/cve/CVE-2016-2168" }, { "category": "external", "summary": "SUSE Bug 976850 for CVE-2016-2168", "url": "https://bugzilla.suse.com/976850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2168" }, { "cve": "CVE-2016-8734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8734" } ], "notes": [ { "category": "general", "text": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8734", "url": "https://www.suse.com/security/cve/CVE-2016-8734" }, { "category": "external", "summary": "SUSE Bug 1011552 for CVE-2016-8734", "url": "https://bugzilla.suse.com/1011552" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8734" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…