<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for subversion</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:2200-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-08-17T06:38:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-08-17T06:38:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-08-17T06:38:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for subversion</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for subversion fixes the following issues:


- CVE-2017-9800: A malicious, compromised server or MITM may cause svn client to
    execute arbitrary commands by sending repository content with
    svn:externals definitions pointing to crafted svn+ssh URLs. (bsc#1051362)

- Malicious user may commit SHA-1 collisions and cause repository inconsistencies (bsc#1026936)

- CVE-2016-8734: Unrestricted XML entity expansion in
    mod_dontdothat and Subversion clients using http(s):// could lead to denial of service (bsc#1011552) 

- CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm (bsc#976849)

- CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn during COPY/MOVE authorization check (bsc#976850)

- mod_authz_svn: fix authz with mod_auth_kerb/mod_auth_ntlm (bsc#977424)

- make the subversion package conflict with KWallet and Gnome
  Keyring packages with do not require matching subversion versions 
  in SLE 12 and openSUSE Leap 42.1 and thus break the main package
  upon partial upgrade. (bsc#969159)

- CVE-2015-5343: Remotely triggerable heap overflow and out-of-bounds read in
  mod_dav_svn caused by integer overflow when parsing skel-encoded
  request bodies. (bsc#958300)

- Avoid recommending 180+ new pkgs for installation on minimal
  setup due subversion-password-store (bsc#942819)

- CVE-2015-3184: mod_authz_svn: mixed anonymous/authenticated
    httpd (dav) configurations could lead to information leak (bsc#939514) 

- CVE-2015-3187: do not leak paths that were hidden by path-based authz (bsc#939517)

- CVE-2015-0202: Subversion HTTP servers with FSFS repositories were vulnerable
    to a remotely triggerable excessive memory use with certain
    REPORT requests. (bsc#923793)
    
- CVE-2015-0248: Subversion mod_dav_svn and svnserve were vulnerable to a
    remotely triggerable assertion DoS vulnerability for certain
    requests with dynamically evaluated revision numbers.
    (bsc#923794)
    
- CVE-2015-0251: Subversion HTTP servers allow spoofing svn:author property
    values for new revisions (bsc#923795)

- fix sample configuration comments in subversion.conf (bsc#916286)

- fix sysconfig file generation (bsc#911620)

-  CVE-2014-3580: mod_dav_svn invalid REPORT requests could lead to denial of service (bsc#909935)
 
-  CVE-2014-8108: mod_dav_svn use of invalid transaction names could lead to denial of service (bsc#909935)

- INSTALL#SQLite says 'Subversion 1.8 requires SQLite version 3.7.12 or above';
  therefore I lowered the sqlite requirement to make the subversion run on
  older system versions, tooi. [bsc#897033]

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SDK-12-SP2-2017-1340,SUSE-SLE-SDK-12-SP3-2017-1340</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      <Description>Link for SUSE-SU-2017:2200-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:2200-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011552</URL>
      <Description>SUSE Bug 1011552</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1026936</URL>
      <Description>SUSE Bug 1026936</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1051362</URL>
      <Description>SUSE Bug 1051362</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/897033</URL>
      <Description>SUSE Bug 897033</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/909935</URL>
      <Description>SUSE Bug 909935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/911620</URL>
      <Description>SUSE Bug 911620</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/916286</URL>
      <Description>SUSE Bug 916286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/923793</URL>
      <Description>SUSE Bug 923793</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/923794</URL>
      <Description>SUSE Bug 923794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/923795</URL>
      <Description>SUSE Bug 923795</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939514</URL>
      <Description>SUSE Bug 939514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939517</URL>
      <Description>SUSE Bug 939517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/942819</URL>
      <Description>SUSE Bug 942819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/958300</URL>
      <Description>SUSE Bug 958300</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/969159</URL>
      <Description>SUSE Bug 969159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/976849</URL>
      <Description>SUSE Bug 976849</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/976850</URL>
      <Description>SUSE Bug 976850</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/977424</URL>
      <Description>SUSE Bug 977424</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983938</URL>
      <Description>SUSE Bug 983938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3580/</URL>
      <Description>SUSE CVE CVE-2014-3580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8108/</URL>
      <Description>SUSE CVE CVE-2014-8108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0202/</URL>
      <Description>SUSE CVE CVE-2015-0202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0248/</URL>
      <Description>SUSE CVE CVE-2015-0248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0251/</URL>
      <Description>SUSE CVE CVE-2015-0251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3184/</URL>
      <Description>SUSE CVE CVE-2015-3184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3187/</URL>
      <Description>SUSE CVE CVE-2015-3187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5343/</URL>
      <Description>SUSE CVE CVE-2015-5343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2167/</URL>
      <Description>SUSE CVE CVE-2016-2167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2168/</URL>
      <Description>SUSE CVE CVE-2016-2168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8734/</URL>
      <Description>SUSE CVE CVE-2016-8734 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9800/</URL>
      <Description>SUSE CVE CVE-2017-9800 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2" CPE="cpe:/o:suse:sle-sdk:12:sp2">SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3" CPE="cpe:/o:suse:sle-sdk:12:sp3">SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1">
      <FullProductName ProductID="libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1">libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-1.8.19-25.3.1">subversion-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-bash-completion-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-bash-completion-1.8.19-25.3.1">subversion-bash-completion-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-devel-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-devel-1.8.19-25.3.1">subversion-devel-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-perl-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-perl-1.8.19-25.3.1">subversion-perl-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-python-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-python-1.8.19-25.3.1">subversion-python-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-server-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-server-1.8.19-25.3.1">subversion-server-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-tools-1.8.19-25.3.1">
      <FullProductName ProductID="subversion-tools-1.8.19-25.3.1">subversion-tools-1.8.19-25.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1">libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1">subversion-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-bash-completion-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1">subversion-bash-completion-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-devel-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1">subversion-devel-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-perl-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1">subversion-perl-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1">subversion-python-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-server-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1">subversion-server-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-tools-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1">subversion-tools-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1">libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1">subversion-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-bash-completion-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1">subversion-bash-completion-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-devel-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1">subversion-devel-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-perl-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1">subversion-perl-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1">subversion-python-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-server-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1">subversion-server-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-tools-1.8.19-25.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1">subversion-tools-1.8.19-25.3.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.</Note>
    </Notes>
    <CVE>CVE-2014-3580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3580.html</URL>
        <Description>CVE-2014-3580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909935</URL>
        <Description>SUSE Bug 909935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910376</URL>
        <Description>SUSE Bug 910376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.</Note>
    </Notes>
    <CVE>CVE-2014-8108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8108.html</URL>
        <Description>CVE-2014-8108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909935</URL>
        <Description>SUSE Bug 909935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.</Note>
    </Notes>
    <CVE>CVE-2015-0202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0202.html</URL>
        <Description>CVE-2015-0202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923793</URL>
        <Description>SUSE Bug 923793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.</Note>
    </Notes>
    <CVE>CVE-2015-0248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0248.html</URL>
        <Description>CVE-2015-0248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923794</URL>
        <Description>SUSE Bug 923794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.</Note>
    </Notes>
    <CVE>CVE-2015-0251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0251.html</URL>
        <Description>CVE-2015-0251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923795</URL>
        <Description>SUSE Bug 923795</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.</Note>
    </Notes>
    <CVE>CVE-2015-3184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3184.html</URL>
        <Description>CVE-2015-3184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938723</URL>
        <Description>SUSE Bug 938723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939514</URL>
        <Description>SUSE Bug 939514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939516</URL>
        <Description>SUSE Bug 939516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.</Note>
    </Notes>
    <CVE>CVE-2015-3187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3187.html</URL>
        <Description>CVE-2015-3187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939517</URL>
        <Description>SUSE Bug 939517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-5343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5343.html</URL>
        <Description>CVE-2015-5343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958300</URL>
        <Description>SUSE Bug 958300</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.</Note>
    </Notes>
    <CVE>CVE-2016-2167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2167.html</URL>
        <Description>CVE-2016-2167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976849</URL>
        <Description>SUSE Bug 976849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.</Note>
    </Notes>
    <CVE>CVE-2016-2168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2168.html</URL>
        <Description>CVE-2016-2168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976850</URL>
        <Description>SUSE Bug 976850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.</Note>
    </Notes>
    <CVE>CVE-2016-8734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8734.html</URL>
        <Description>CVE-2016-8734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011552</URL>
        <Description>SUSE Bug 1011552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.</Note>
    </Notes>
    <CVE>CVE-2017-9800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:subversion-tools-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:libsvn_auth_gnome_keyring-1-0-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-bash-completion-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-devel-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-perl-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-python-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-server-1.8.19-25.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP3:subversion-tools-1.8.19-25.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20172200-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9800.html</URL>
        <Description>CVE-2017-9800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051362</URL>
        <Description>SUSE Bug 1051362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052481</URL>
        <Description>SUSE Bug 1052481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052696</URL>
        <Description>SUSE Bug 1052696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052932</URL>
        <Description>SUSE Bug 1052932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053364</URL>
        <Description>SUSE Bug 1053364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054653</URL>
        <Description>SUSE Bug 1054653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066430</URL>
        <Description>SUSE Bug 1066430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071709</URL>
        <Description>SUSE Bug 1071709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128150</URL>
        <Description>SUSE Bug 1128150</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
