<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for subversion</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:2363-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-12-25T12:58:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-12-25T12:58:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-12-25T12:58:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for subversion</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following security issues:

* CVE-2015-5343: Possible remotely triggerable heap overflow and out-of-bounds read in mod_dav_svn caused by integer overflow when parsing skel-encoded request bodies. (bsc#958300)
* CVE-2015-3184: mod_authz_svn information leak information in mixed anonymous/authenticated httpd (dav) configurations (bsc#939514)
* CVE-2015-3187: hidden paths leaked by path-based authz (bsc#939517)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-12/msg00111.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:2363-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1">
      <FullProductName ProductID="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1">libsvn_auth_gnome_keyring-1-0-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_kwallet-1-0-1.8.10-6.1">
      <FullProductName ProductID="libsvn_auth_kwallet-1-0-1.8.10-6.1">libsvn_auth_kwallet-1-0-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-1.8.10-6.1">
      <FullProductName ProductID="subversion-1.8.10-6.1">subversion-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-bash-completion-1.8.10-6.1">
      <FullProductName ProductID="subversion-bash-completion-1.8.10-6.1">subversion-bash-completion-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-devel-1.8.10-6.1">
      <FullProductName ProductID="subversion-devel-1.8.10-6.1">subversion-devel-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-perl-1.8.10-6.1">
      <FullProductName ProductID="subversion-perl-1.8.10-6.1">subversion-perl-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-python-1.8.10-6.1">
      <FullProductName ProductID="subversion-python-1.8.10-6.1">subversion-python-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-ruby-1.8.10-6.1">
      <FullProductName ProductID="subversion-ruby-1.8.10-6.1">subversion-ruby-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-server-1.8.10-6.1">
      <FullProductName ProductID="subversion-server-1.8.10-6.1">subversion-server-1.8.10-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-tools-1.8.10-6.1">
      <FullProductName ProductID="subversion-tools-1.8.10-6.1">subversion-tools-1.8.10-6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsvn_auth_gnome_keyring-1-0-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsvn_auth_gnome_keyring-1-0-1.8.10-6.1">libsvn_auth_gnome_keyring-1-0-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvn_auth_kwallet-1-0-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsvn_auth_kwallet-1-0-1.8.10-6.1">libsvn_auth_kwallet-1-0-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-1.8.10-6.1">subversion-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-bash-completion-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-bash-completion-1.8.10-6.1">subversion-bash-completion-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-devel-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-devel-1.8.10-6.1">subversion-devel-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-perl-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-perl-1.8.10-6.1">subversion-perl-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-python-1.8.10-6.1">subversion-python-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-ruby-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-ruby-1.8.10-6.1">subversion-ruby-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-server-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-server-1.8.10-6.1">subversion-server-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-tools-1.8.10-6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:subversion-tools-1.8.10-6.1">subversion-tools-1.8.10-6.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.</Note>
    </Notes>
    <CVE>CVE-2015-3184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libsvn_auth_gnome_keyring-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsvn_auth_kwallet-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-bash-completion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-devel-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-perl-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-python-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-ruby-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-server-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-tools-1.8.10-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-12/msg00111.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3184.html</URL>
        <Description>CVE-2015-3184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938723</URL>
        <Description>SUSE Bug 938723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939514</URL>
        <Description>SUSE Bug 939514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939516</URL>
        <Description>SUSE Bug 939516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.</Note>
    </Notes>
    <CVE>CVE-2015-3187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libsvn_auth_gnome_keyring-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsvn_auth_kwallet-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-bash-completion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-devel-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-perl-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-python-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-ruby-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-server-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-tools-1.8.10-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-12/msg00111.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3187.html</URL>
        <Description>CVE-2015-3187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939517</URL>
        <Description>SUSE Bug 939517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-5343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libsvn_auth_gnome_keyring-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsvn_auth_kwallet-1-0-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-bash-completion-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-devel-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-perl-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-python-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-ruby-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-server-1.8.10-6.1</ProductID>
        <ProductID>openSUSE Leap 42.1:subversion-tools-1.8.10-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-12/msg00111.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5343.html</URL>
        <Description>CVE-2015-5343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958300</URL>
        <Description>SUSE Bug 958300</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
