Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1783 (GCVE-0-2011-1783)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1783", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-1783\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-06-06T19:55:01.940\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 habilitada permite a atacantes remotos a causar una denegaci\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\u00f3n de datos en circunstancias oportunistas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0\",\"versionEndIncluding\":\"1.5.8\",\"matchCriteriaId\":\"B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6.0\",\"versionEndExcluding\":\"1.6.17\",\"matchCriteriaId\":\"EC997332-2E0B-4584-89E9-26BDADD2E817\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE52846-24EC-4068-B788-EC7F915FFF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9396E005-22D8-4342-9323-C7DEA379191D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.7.3\",\"matchCriteriaId\":\"22675032-282C-4F77-B590-46F3FAD615C3\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44633\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44681\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44849\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45162\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2251\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0862.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48091\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025618\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1144-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=709112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://subversion.apache.org/security/CVE-2011-1783-advisory.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2251\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0862.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48091\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1144-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=709112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
fkie_cve-2011-1783
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html | Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/44633 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/44681 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/44849 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/44888 | Third Party Advisory | |
secalert@redhat.com | http://secunia.com/advisories/45162 | Third Party Advisory | |
secalert@redhat.com | http://subversion.apache.org/security/CVE-2011-1783-advisory.txt | Vendor Advisory | |
secalert@redhat.com | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
secalert@redhat.com | http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES | Release Notes, Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2011/dsa-2251 | Third Party Advisory | |
secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:106 | Third Party Advisory | |
secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-0862.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/48091 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id?1025618 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1144-1 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=709112 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44633 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44681 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44849 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44888 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45162 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2011-1783-advisory.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5130 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2251 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:106 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0862.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48091 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025618 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1144-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=709112 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 | |
canonical | ubuntu_linux | 11.04 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
fedoraproject | fedora | 14 | |
fedoraproject | fedora | 15 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7", "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC997332-2E0B-4584-89E9-26BDADD2E817", "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "22675032-282C-4F77-B590-46F3FAD615C3", "versionEndExcluding": "10.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 habilitada permite a atacantes remotos a causar una denegaci\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\u00f3n de datos en circunstancias oportunistas." } ], "id": "CVE-2011-1783", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:01.940", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6hv5-jvfr-j4jm
Vulnerability from github
Published
2022-05-13 01:14
Modified
2022-05-13 01:14
VLAI Severity ?
Details
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
{ "affected": [], "aliases": [ "CVE-2011-1783" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-06-06T19:55:00Z", "severity": "MODERATE" }, "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GHSA-6hv5-jvfr-j4jm", "modified": "2022-05-13T01:14:59Z", "published": "2022-05-13T01:14:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/44633" }, { "type": "WEB", "url": "http://secunia.com/advisories/44681" }, { "type": "WEB", "url": "http://secunia.com/advisories/44849" }, { "type": "WEB", "url": "http://secunia.com/advisories/44888" }, { "type": "WEB", "url": "http://secunia.com/advisories/45162" }, { "type": "WEB", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5130" }, { "type": "WEB", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/48091" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025618" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1144-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2011:0862
Vulnerability from csaf_redhat
Published
2011-06-08 15:41
Modified
2024-11-22 04:23
Summary
Red Hat Security Advisory: subversion security update
Notes
Topic
Updated subversion packages that fix three security issues are now
available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access to
Subversion repositories via HTTP.
An infinite loop flaw was found in the way the mod_dav_svn module processed
certain data sets. If the SVNPathAuthz directive was set to
"short_circuit", and path-based access control for files and directories
was enabled, a malicious, remote user could use this flaw to cause the
httpd process serving the request to consume an excessive amount of system
memory. (CVE-2011-1783)
A NULL pointer dereference flaw was found in the way the mod_dav_svn module
processed requests submitted against the URL of a baselined resource. A
malicious, remote user could use this flaw to cause the httpd process
serving the request to crash. (CVE-2011-1752)
An information disclosure flaw was found in the way the mod_dav_svn
module processed certain URLs when path-based access control for files and
directories was enabled. A malicious, remote user could possibly use this
flaw to access certain files in a repository that would otherwise not be
accessible to them. Note: This vulnerability cannot be triggered if the
SVNPathAuthz directive is set to "short_circuit". (CVE-2011-1921)
Red Hat would like to thank the Apache Subversion project for reporting
these issues. Upstream acknowledges Joe Schaefer of the Apache Software
Foundation as the original reporter of CVE-2011-1752; Ivan Zhakov of
VisualSVN as the original reporter of CVE-2011-1783; and Kamesh
Jayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.
All Subversion users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, you must restart the httpd daemon, if you are using
mod_dav_svn, for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nAn infinite loop flaw was found in the way the mod_dav_svn module processed\ncertain data sets. If the SVNPathAuthz directive was set to\n\"short_circuit\", and path-based access control for files and directories\nwas enabled, a malicious, remote user could use this flaw to cause the\nhttpd process serving the request to consume an excessive amount of system\nmemory. (CVE-2011-1783)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed requests submitted against the URL of a baselined resource. A\nmalicious, remote user could use this flaw to cause the httpd process\nserving the request to crash. (CVE-2011-1752)\n\nAn information disclosure flaw was found in the way the mod_dav_svn\nmodule processed certain URLs when path-based access control for files and\ndirectories was enabled. A malicious, remote user could possibly use this\nflaw to access certain files in a repository that would otherwise not be\naccessible to them. Note: This vulnerability cannot be triggered if the\nSVNPathAuthz directive is set to \"short_circuit\". (CVE-2011-1921)\n\nRed Hat would like to thank the Apache Subversion project for reporting\nthese issues. Upstream acknowledges Joe Schaefer of the Apache Software\nFoundation as the original reporter of CVE-2011-1752; Ivan Zhakov of\nVisualSVN as the original reporter of CVE-2011-1783; and Kamesh\nJayachandran of CollabNet, Inc. as the original reporter of CVE-2011-1921.\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, you must restart the httpd daemon, if you are using\nmod_dav_svn, for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0862", "url": "https://access.redhat.com/errata/RHSA-2011:0862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "category": "external", "summary": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt", "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "category": "external", "summary": "709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0862.json" } ], "title": "Red Hat Security Advisory: subversion security update", "tracking": { "current_release_date": "2024-11-22T04:23:46+00:00", "generator": { "date": "2024-11-22T04:23:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0862", "initial_release_date": "2011-06-08T15:41:00+00:00", "revision_history": [ { "date": "2011-06-08T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-08T11:47:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:23:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=i686" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_id": "subversion-0:1.6.11-2.el6_1.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ppc" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=s390x" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-kde@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-gnome@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.s390", "product_id": "subversion-0:1.6.11-2.el6_1.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=s390" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.s390", "product_id": "subversion-0:1.6.11-7.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "subversion-0:1.6.11-2.el6_1.4.src", "product": { "name": "subversion-0:1.6.11-2.el6_1.4.src", "product_id": "subversion-0:1.6.11-2.el6_1.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-2.el6_1.4?arch=src" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.src", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.src", "product_id": "subversion-0:1.6.11-7.el5_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_id": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-svn2cl@1.6.11-2.el6_1.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=ia64" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-debuginfo@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-devel@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_id": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_dav_svn@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-perl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-javahl@1.6.11-7.el5_6.4?arch=i386" } } }, { "category": "product_version", "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_id": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/subversion-ruby@1.6.11-7.el5_6.4?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64" }, "product_reference": "subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" }, "product_reference": "subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1752", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709111" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "RHBZ#709111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1752" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] }, { "names": [ "Ivan Zhakov" ], "organization": "VisualSVN", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2011-1783", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709112" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "RHBZ#709112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1783", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1783" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control" }, { "acknowledgments": [ { "names": [ "Apache Subversion project" ] } ], "cve": "CVE-2011-1921", "discovery_date": "2011-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709114" } ], "notes": [ { "category": "description", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "RHBZ#709114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1921" } ], "release_date": "2011-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T15:41:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0862" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:mod_dav_svn-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.src", "5Server-5.6.Z:subversion-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-debuginfo-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.ppc64", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-devel-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-javahl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-perl-0:1.6.11-7.el5_6.4.x86_64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.i386", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ia64", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.ppc", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.s390x", "5Server-5.6.Z:subversion-ruby-0:1.6.11-7.el5_6.4.x86_64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:mod_dav_svn-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.src", "6Server-optional-6.1.z:subversion-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-debuginfo-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-devel-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-gnome-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-javahl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-kde-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-perl-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.i686", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.ppc64", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.s390x", "6Server-optional-6.1.z:subversion-ruby-0:1.6.11-2.el6_1.4.x86_64", "6Server-optional-6.1.z:subversion-svn2cl-0:1.6.11-2.el6_1.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "(mod_dav_svn): File contents disclosure of files configured to be unreadable by those users" } ] }
opensuse-su-2024:10538-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media
Notes
Title of the patch
libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10538
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10538", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10538-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-2411 page", "url": "https://www.suse.com/security/cve/CVE-2009-2411/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3315 page", "url": "https://www.suse.com/security/cve/CVE-2010-3315/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-4539 page", "url": "https://www.suse.com/security/cve/CVE-2010-4539/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-4644 page", "url": "https://www.suse.com/security/cve/CVE-2010-4644/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0715 page", "url": "https://www.suse.com/security/cve/CVE-2011-0715/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1752 page", "url": "https://www.suse.com/security/cve/CVE-2011-1752/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1783 page", "url": "https://www.suse.com/security/cve/CVE-2011-1783/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1921 page", "url": "https://www.suse.com/security/cve/CVE-2011-1921/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1845 page", "url": "https://www.suse.com/security/cve/CVE-2013-1845/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1846 page", "url": "https://www.suse.com/security/cve/CVE-2013-1846/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1847 page", "url": "https://www.suse.com/security/cve/CVE-2013-1847/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1849 page", "url": "https://www.suse.com/security/cve/CVE-2013-1849/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1884 page", "url": "https://www.suse.com/security/cve/CVE-2013-1884/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-1968 page", "url": "https://www.suse.com/security/cve/CVE-2013-1968/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2088 page", "url": "https://www.suse.com/security/cve/CVE-2013-2088/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2112 page", "url": "https://www.suse.com/security/cve/CVE-2013-2112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4131 page", "url": "https://www.suse.com/security/cve/CVE-2013-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4246 page", "url": "https://www.suse.com/security/cve/CVE-2013-4246/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4262 page", "url": "https://www.suse.com/security/cve/CVE-2013-4262/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4277 page", "url": "https://www.suse.com/security/cve/CVE-2013-4277/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4505 page", "url": "https://www.suse.com/security/cve/CVE-2013-4505/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4558 page", "url": "https://www.suse.com/security/cve/CVE-2013-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0032 page", "url": "https://www.suse.com/security/cve/CVE-2014-0032/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3522 page", "url": "https://www.suse.com/security/cve/CVE-2014-3522/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3528 page", "url": "https://www.suse.com/security/cve/CVE-2014-3528/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3580 page", "url": "https://www.suse.com/security/cve/CVE-2014-3580/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8108 page", "url": "https://www.suse.com/security/cve/CVE-2014-8108/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0202 page", "url": "https://www.suse.com/security/cve/CVE-2015-0202/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0248 page", "url": "https://www.suse.com/security/cve/CVE-2015-0248/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0251 page", "url": "https://www.suse.com/security/cve/CVE-2015-0251/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3184 page", "url": "https://www.suse.com/security/cve/CVE-2015-3184/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3187 page", "url": "https://www.suse.com/security/cve/CVE-2015-3187/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5259 page", "url": "https://www.suse.com/security/cve/CVE-2015-5259/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5343 page", "url": "https://www.suse.com/security/cve/CVE-2015-5343/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2167 page", "url": "https://www.suse.com/security/cve/CVE-2016-2167/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2168 page", "url": "https://www.suse.com/security/cve/CVE-2016-2168/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8734 page", "url": "https://www.suse.com/security/cve/CVE-2016-8734/" } ], "title": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10538-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.aarch64", "product": { "name": "subversion-1.9.5-1.1.aarch64", "product_id": "subversion-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.aarch64", "product": { "name": "subversion-bash-completion-1.9.5-1.1.aarch64", "product_id": "subversion-bash-completion-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.aarch64", "product": { "name": "subversion-devel-1.9.5-1.1.aarch64", "product_id": "subversion-devel-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.aarch64", "product": { "name": "subversion-perl-1.9.5-1.1.aarch64", "product_id": "subversion-perl-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.aarch64", "product": { "name": "subversion-python-1.9.5-1.1.aarch64", "product_id": "subversion-python-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.aarch64", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.aarch64", "product_id": "subversion-python-ctypes-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.aarch64", "product": { "name": "subversion-ruby-1.9.5-1.1.aarch64", "product_id": "subversion-ruby-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.aarch64", "product": { "name": "subversion-server-1.9.5-1.1.aarch64", "product_id": "subversion-server-1.9.5-1.1.aarch64" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.aarch64", "product": { "name": "subversion-tools-1.9.5-1.1.aarch64", "product_id": "subversion-tools-1.9.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.ppc64le", "product": { "name": "subversion-1.9.5-1.1.ppc64le", "product_id": "subversion-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.ppc64le", "product": { "name": "subversion-bash-completion-1.9.5-1.1.ppc64le", "product_id": "subversion-bash-completion-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.ppc64le", "product": { "name": "subversion-devel-1.9.5-1.1.ppc64le", "product_id": "subversion-devel-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.ppc64le", "product": { "name": "subversion-perl-1.9.5-1.1.ppc64le", "product_id": "subversion-perl-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.ppc64le", "product": { "name": "subversion-python-1.9.5-1.1.ppc64le", "product_id": "subversion-python-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "product_id": "subversion-python-ctypes-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.ppc64le", "product": { "name": "subversion-ruby-1.9.5-1.1.ppc64le", "product_id": "subversion-ruby-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.ppc64le", "product": { "name": "subversion-server-1.9.5-1.1.ppc64le", "product_id": "subversion-server-1.9.5-1.1.ppc64le" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.ppc64le", "product": { "name": "subversion-tools-1.9.5-1.1.ppc64le", "product_id": "subversion-tools-1.9.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.s390x", "product": { "name": "subversion-1.9.5-1.1.s390x", "product_id": "subversion-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.s390x", "product": { "name": "subversion-bash-completion-1.9.5-1.1.s390x", "product_id": "subversion-bash-completion-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.s390x", "product": { "name": "subversion-devel-1.9.5-1.1.s390x", "product_id": "subversion-devel-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.s390x", "product": { "name": "subversion-perl-1.9.5-1.1.s390x", "product_id": "subversion-perl-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.s390x", "product": { "name": "subversion-python-1.9.5-1.1.s390x", "product_id": "subversion-python-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.s390x", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.s390x", "product_id": "subversion-python-ctypes-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.s390x", "product": { "name": "subversion-ruby-1.9.5-1.1.s390x", "product_id": "subversion-ruby-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.s390x", "product": { "name": "subversion-server-1.9.5-1.1.s390x", "product_id": "subversion-server-1.9.5-1.1.s390x" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.s390x", "product": { "name": "subversion-tools-1.9.5-1.1.s390x", "product_id": "subversion-tools-1.9.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "product": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "product_id": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "product": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "product_id": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-1.9.5-1.1.x86_64", "product": { "name": "subversion-1.9.5-1.1.x86_64", "product_id": "subversion-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-bash-completion-1.9.5-1.1.x86_64", "product": { "name": "subversion-bash-completion-1.9.5-1.1.x86_64", "product_id": "subversion-bash-completion-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-devel-1.9.5-1.1.x86_64", "product": { "name": "subversion-devel-1.9.5-1.1.x86_64", "product_id": "subversion-devel-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-perl-1.9.5-1.1.x86_64", "product": { "name": "subversion-perl-1.9.5-1.1.x86_64", "product_id": "subversion-perl-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-python-1.9.5-1.1.x86_64", "product": { "name": "subversion-python-1.9.5-1.1.x86_64", "product_id": "subversion-python-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-python-ctypes-1.9.5-1.1.x86_64", "product": { "name": "subversion-python-ctypes-1.9.5-1.1.x86_64", "product_id": "subversion-python-ctypes-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-ruby-1.9.5-1.1.x86_64", "product": { "name": "subversion-ruby-1.9.5-1.1.x86_64", "product_id": "subversion-ruby-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-server-1.9.5-1.1.x86_64", "product": { "name": "subversion-server-1.9.5-1.1.x86_64", "product_id": "subversion-server-1.9.5-1.1.x86_64" } }, { "category": "product_version", "name": "subversion-tools-1.9.5-1.1.x86_64", "product": { "name": "subversion-tools-1.9.5-1.1.x86_64", "product_id": "subversion-tools-1.9.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64" }, "product_reference": "libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64" }, "product_reference": "libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64" }, "product_reference": "subversion-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x" }, "product_reference": "subversion-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64" }, "product_reference": "subversion-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-bash-completion-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64" }, "product_reference": "subversion-bash-completion-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64" }, "product_reference": "subversion-devel-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-devel-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x" }, "product_reference": "subversion-devel-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-devel-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64" }, "product_reference": "subversion-devel-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64" }, "product_reference": "subversion-perl-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-perl-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x" }, "product_reference": "subversion-perl-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-perl-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64" }, "product_reference": "subversion-perl-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64" }, "product_reference": "subversion-python-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-python-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x" }, "product_reference": "subversion-python-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64" }, "product_reference": "subversion-python-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-python-ctypes-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64" }, "product_reference": "subversion-python-ctypes-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64" }, "product_reference": "subversion-ruby-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-ruby-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x" }, "product_reference": "subversion-ruby-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-ruby-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64" }, "product_reference": "subversion-ruby-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64" }, "product_reference": "subversion-server-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-server-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x" }, "product_reference": "subversion-server-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-server-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64" }, "product_reference": "subversion-server-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64" }, "product_reference": "subversion-tools-1.9.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le" }, "product_reference": "subversion-tools-1.9.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x" }, "product_reference": "subversion-tools-1.9.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "subversion-tools-1.9.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" }, "product_reference": "subversion-tools-1.9.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2411", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-2411" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-2411", "url": "https://www.suse.com/security/cve/CVE-2009-2411" }, { "category": "external", "summary": "SUSE Bug 528714 for CVE-2009-2411", "url": "https://bugzilla.suse.com/528714" }, { "category": "external", "summary": "SUSE Bug 802057 for CVE-2009-2411", "url": "https://bugzilla.suse.com/802057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-2411" }, { "cve": "CVE-2010-3315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3315" } ], "notes": [ { "category": "general", "text": "authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3315", "url": "https://www.suse.com/security/cve/CVE-2010-3315" }, { "category": "external", "summary": "SUSE Bug 649861 for CVE-2010-3315", "url": "https://bugzilla.suse.com/649861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-3315" }, { "cve": "CVE-2010-4539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-4539" } ], "notes": [ { "category": "general", "text": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-4539", "url": "https://www.suse.com/security/cve/CVE-2010-4539" }, { "category": "external", "summary": "SUSE Bug 662030 for CVE-2010-4539", "url": "https://bugzilla.suse.com/662030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-4539" }, { "cve": "CVE-2010-4644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-4644" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-4644", "url": "https://www.suse.com/security/cve/CVE-2010-4644" }, { "category": "external", "summary": "SUSE Bug 662030 for CVE-2010-4644", "url": "https://bugzilla.suse.com/662030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-4644" }, { "cve": "CVE-2011-0715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0715" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0715", "url": "https://www.suse.com/security/cve/CVE-2011-0715" }, { "category": "external", "summary": "SUSE Bug 676949 for CVE-2011-0715", "url": "https://bugzilla.suse.com/676949" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0715" }, { "cve": "CVE-2011-1752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1752" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1752", "url": "https://www.suse.com/security/cve/CVE-2011-1752" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1752", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1752" }, { "cve": "CVE-2011-1783", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1783" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1783", "url": "https://www.suse.com/security/cve/CVE-2011-1783" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1783", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1783" }, { "cve": "CVE-2011-1921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1921" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1921", "url": "https://www.suse.com/security/cve/CVE-2011-1921" }, { "category": "external", "summary": "SUSE Bug 698205 for CVE-2011-1921", "url": "https://bugzilla.suse.com/698205" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1921" }, { "cve": "CVE-2013-1845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1845" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1845", "url": "https://www.suse.com/security/cve/CVE-2013-1845" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1845", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-1845" }, { "cve": "CVE-2013-1846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1846" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1846", "url": "https://www.suse.com/security/cve/CVE-2013-1846" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1846", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-1846" }, { "cve": "CVE-2013-1847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1847" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1847", "url": "https://www.suse.com/security/cve/CVE-2013-1847" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1847", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1847" }, { "cve": "CVE-2013-1849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1849" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1849", "url": "https://www.suse.com/security/cve/CVE-2013-1849" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1849", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1849" }, { "cve": "CVE-2013-1884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1884" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1884", "url": "https://www.suse.com/security/cve/CVE-2013-1884" }, { "category": "external", "summary": "SUSE Bug 813913 for CVE-2013-1884", "url": "https://bugzilla.suse.com/813913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1884" }, { "cve": "CVE-2013-1968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-1968" } ], "notes": [ { "category": "general", "text": "Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-1968", "url": "https://www.suse.com/security/cve/CVE-2013-1968" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-1968", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-1968" }, { "cve": "CVE-2013-2088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2088" } ], "notes": [ { "category": "general", "text": "contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2088", "url": "https://www.suse.com/security/cve/CVE-2013-2088" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-2088", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2088" }, { "cve": "CVE-2013-2112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2112" } ], "notes": [ { "category": "general", "text": "The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2112", "url": "https://www.suse.com/security/cve/CVE-2013-2112" }, { "category": "external", "summary": "SUSE Bug 821505 for CVE-2013-2112", "url": "https://bugzilla.suse.com/821505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2112" }, { "cve": "CVE-2013-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4131" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4131", "url": "https://www.suse.com/security/cve/CVE-2013-4131" }, { "category": "external", "summary": "SUSE Bug 830031 for CVE-2013-4131", "url": "https://bugzilla.suse.com/830031" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4131" }, { "cve": "CVE-2013-4246", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4246" } ], "notes": [ { "category": "general", "text": "libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4246", "url": "https://www.suse.com/security/cve/CVE-2013-4246" }, { "category": "external", "summary": "SUSE Bug 836245 for CVE-2013-4246", "url": "https://bugzilla.suse.com/836245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4246" }, { "cve": "CVE-2013-4262", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4262" } ], "notes": [ { "category": "general", "text": "svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4262", "url": "https://www.suse.com/security/cve/CVE-2013-4262" }, { "category": "external", "summary": "SUSE Bug 844201 for CVE-2013-4262", "url": "https://bugzilla.suse.com/844201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4262" }, { "cve": "CVE-2013-4277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4277" } ], "notes": [ { "category": "general", "text": "Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4277", "url": "https://www.suse.com/security/cve/CVE-2013-4277" }, { "category": "external", "summary": "SUSE Bug 836245 for CVE-2013-4277", "url": "https://bugzilla.suse.com/836245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-4277" }, { "cve": "CVE-2013-4505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4505" } ], "notes": [ { "category": "general", "text": "The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4505", "url": "https://www.suse.com/security/cve/CVE-2013-4505" }, { "category": "external", "summary": "SUSE Bug 850667 for CVE-2013-4505", "url": "https://bugzilla.suse.com/850667" }, { "category": "external", "summary": "SUSE Bug 850747 for CVE-2013-4505", "url": "https://bugzilla.suse.com/850747" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2013-4505", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4505" }, { "cve": "CVE-2013-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4558" } ], "notes": [ { "category": "general", "text": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4558", "url": "https://www.suse.com/security/cve/CVE-2013-4558" }, { "category": "external", "summary": "SUSE Bug 850667 for CVE-2013-4558", "url": "https://bugzilla.suse.com/850667" }, { "category": "external", "summary": "SUSE Bug 850747 for CVE-2013-4558", "url": "https://bugzilla.suse.com/850747" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2013-4558", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-4558" }, { "cve": "CVE-2014-0032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0032" } ], "notes": [ { "category": "general", "text": "The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the \"svn ls http://svn.example.com\" command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0032", "url": "https://www.suse.com/security/cve/CVE-2014-0032" }, { "category": "external", "summary": "SUSE Bug 862459 for CVE-2014-0032", "url": "https://bugzilla.suse.com/862459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0032" }, { "cve": "CVE-2014-3522", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3522" } ], "notes": [ { "category": "general", "text": "The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3522", "url": "https://www.suse.com/security/cve/CVE-2014-3522" }, { "category": "external", "summary": "SUSE Bug 890511 for CVE-2014-3522", "url": "https://bugzilla.suse.com/890511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-3522" }, { "cve": "CVE-2014-3528", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3528" } ], "notes": [ { "category": "general", "text": "Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3528", "url": "https://www.suse.com/security/cve/CVE-2014-3528" }, { "category": "external", "summary": "SUSE Bug 889849 for CVE-2014-3528", "url": "https://bugzilla.suse.com/889849" }, { "category": "external", "summary": "SUSE Bug 890511 for CVE-2014-3528", "url": "https://bugzilla.suse.com/890511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-3528" }, { "cve": "CVE-2014-3580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3580" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3580", "url": "https://www.suse.com/security/cve/CVE-2014-3580" }, { "category": "external", "summary": "SUSE Bug 909935 for CVE-2014-3580", "url": "https://bugzilla.suse.com/909935" }, { "category": "external", "summary": "SUSE Bug 910376 for CVE-2014-3580", "url": "https://bugzilla.suse.com/910376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3580" }, { "cve": "CVE-2014-8108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8108" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8108", "url": "https://www.suse.com/security/cve/CVE-2014-8108" }, { "category": "external", "summary": "SUSE Bug 909935 for CVE-2014-8108", "url": "https://bugzilla.suse.com/909935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8108" }, { "cve": "CVE-2015-0202", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0202" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0202", "url": "https://www.suse.com/security/cve/CVE-2015-0202" }, { "category": "external", "summary": "SUSE Bug 923793 for CVE-2015-0202", "url": "https://bugzilla.suse.com/923793" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-0202" }, { "cve": "CVE-2015-0248", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0248" } ], "notes": [ { "category": "general", "text": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0248", "url": "https://www.suse.com/security/cve/CVE-2015-0248" }, { "category": "external", "summary": "SUSE Bug 923794 for CVE-2015-0248", "url": "https://bugzilla.suse.com/923794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-0248" }, { "cve": "CVE-2015-0251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0251" } ], "notes": [ { "category": "general", "text": "The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0251", "url": "https://www.suse.com/security/cve/CVE-2015-0251" }, { "category": "external", "summary": "SUSE Bug 923795 for CVE-2015-0251", "url": "https://bugzilla.suse.com/923795" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-0251" }, { "cve": "CVE-2015-3184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3184" } ], "notes": [ { "category": "general", "text": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3184", "url": "https://www.suse.com/security/cve/CVE-2015-3184" }, { "category": "external", "summary": "SUSE Bug 938723 for CVE-2015-3184", "url": "https://bugzilla.suse.com/938723" }, { "category": "external", "summary": "SUSE Bug 939514 for CVE-2015-3184", "url": "https://bugzilla.suse.com/939514" }, { "category": "external", "summary": "SUSE Bug 939516 for CVE-2015-3184", "url": "https://bugzilla.suse.com/939516" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3184" }, { "cve": "CVE-2015-3187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3187" } ], "notes": [ { "category": "general", "text": "The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3187", "url": "https://www.suse.com/security/cve/CVE-2015-3187" }, { "category": "external", "summary": "SUSE Bug 939517 for CVE-2015-3187", "url": "https://bugzilla.suse.com/939517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-3187" }, { "cve": "CVE-2015-5259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5259" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5259", "url": "https://www.suse.com/security/cve/CVE-2015-5259" }, { "category": "external", "summary": "SUSE Bug 958299 for CVE-2015-5259", "url": "https://bugzilla.suse.com/958299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5259" }, { "cve": "CVE-2015-5343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5343" } ], "notes": [ { "category": "general", "text": "Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5343", "url": "https://www.suse.com/security/cve/CVE-2015-5343" }, { "category": "external", "summary": "SUSE Bug 958300 for CVE-2015-5343", "url": "https://bugzilla.suse.com/958300" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5343" }, { "cve": "CVE-2016-2167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2167" } ], "notes": [ { "category": "general", "text": "The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2167", "url": "https://www.suse.com/security/cve/CVE-2016-2167" }, { "category": "external", "summary": "SUSE Bug 976849 for CVE-2016-2167", "url": "https://bugzilla.suse.com/976849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2167" }, { "cve": "CVE-2016-2168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2168" } ], "notes": [ { "category": "general", "text": "The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2168", "url": "https://www.suse.com/security/cve/CVE-2016-2168" }, { "category": "external", "summary": "SUSE Bug 976850 for CVE-2016-2168", "url": "https://bugzilla.suse.com/976850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2168" }, { "cve": "CVE-2016-8734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8734" } ], "notes": [ { "category": "general", "text": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8734", "url": "https://www.suse.com/security/cve/CVE-2016-8734" }, { "category": "external", "summary": "SUSE Bug 1011552 for CVE-2016-8734", "url": "https://bugzilla.suse.com/1011552" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.s390x", "openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-devel-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-perl-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-server-1.9.5-1.1.x86_64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.aarch64", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.ppc64le", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.s390x", "openSUSE Tumbleweed:subversion-tools-1.9.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8734" } ] }
gsd-2011-1783
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2011-1783", "description": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GSD-2011-1783", "references": [ "https://www.suse.com/security/cve/CVE-2011-1783.html", "https://www.debian.org/security/2011/dsa-2251", "https://access.redhat.com/errata/RHSA-2011:0862", "https://linux.oracle.com/cve/CVE-2011-1783.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-1783" ], "details": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.", "id": "GSD-2011-1783", "modified": "2023-12-13T01:19:08.385567Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1783", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "http://secunia.com/advisories/44633", "refsource": "MISC", "url": "http://secunia.com/advisories/44633" }, { "name": "http://secunia.com/advisories/44681", "refsource": "MISC", "url": "http://secunia.com/advisories/44681" }, { "name": "http://secunia.com/advisories/44849", "refsource": "MISC", "url": "http://secunia.com/advisories/44849" }, { "name": "http://secunia.com/advisories/44888", "refsource": "MISC", "url": "http://secunia.com/advisories/44888" }, { "name": "http://secunia.com/advisories/45162", "refsource": "MISC", "url": "http://secunia.com/advisories/45162" }, { "name": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "refsource": "MISC", "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "MISC", "url": "http://support.apple.com/kb/HT5130" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES", "refsource": "MISC", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "http://www.debian.org/security/2011/dsa-2251", "refsource": "MISC", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-0862.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "http://www.securityfocus.com/bid/48091", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/48091" }, { "name": "http://www.securitytracker.com/id?1025618", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1025618" }, { "name": "http://www.ubuntu.com/usn/USN-1144-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=709112", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1783" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=709112", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "DSA-2251", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "44681", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "44633", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "name": "MDVSA-2011:106", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "1025618", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "RHSA-2011:0862", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8352", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "USN-1144-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "name": "44888", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "name": "44849", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "name": "45162", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "name": "FEDORA-2011-8341", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "oval:org.mitre.oval:def:18889", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-10-05T19:05Z", "publishedDate": "2011-06-06T19:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…