<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10538-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10538</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2411/</URL>
      <Description>SUSE CVE CVE-2009-2411 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3315/</URL>
      <Description>SUSE CVE CVE-2010-3315 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4539/</URL>
      <Description>SUSE CVE CVE-2010-4539 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4644/</URL>
      <Description>SUSE CVE CVE-2010-4644 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0715/</URL>
      <Description>SUSE CVE CVE-2011-0715 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1752/</URL>
      <Description>SUSE CVE CVE-2011-1752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1783/</URL>
      <Description>SUSE CVE CVE-2011-1783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1921/</URL>
      <Description>SUSE CVE CVE-2011-1921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1845/</URL>
      <Description>SUSE CVE CVE-2013-1845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1846/</URL>
      <Description>SUSE CVE CVE-2013-1846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1847/</URL>
      <Description>SUSE CVE CVE-2013-1847 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1849/</URL>
      <Description>SUSE CVE CVE-2013-1849 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1884/</URL>
      <Description>SUSE CVE CVE-2013-1884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1968/</URL>
      <Description>SUSE CVE CVE-2013-1968 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2088/</URL>
      <Description>SUSE CVE CVE-2013-2088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2112/</URL>
      <Description>SUSE CVE CVE-2013-2112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4131/</URL>
      <Description>SUSE CVE CVE-2013-4131 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4246/</URL>
      <Description>SUSE CVE CVE-2013-4246 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4262/</URL>
      <Description>SUSE CVE CVE-2013-4262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4277/</URL>
      <Description>SUSE CVE CVE-2013-4277 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4505/</URL>
      <Description>SUSE CVE CVE-2013-4505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4558/</URL>
      <Description>SUSE CVE CVE-2013-4558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0032/</URL>
      <Description>SUSE CVE CVE-2014-0032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3522/</URL>
      <Description>SUSE CVE CVE-2014-3522 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3528/</URL>
      <Description>SUSE CVE CVE-2014-3528 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3580/</URL>
      <Description>SUSE CVE CVE-2014-3580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8108/</URL>
      <Description>SUSE CVE CVE-2014-8108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0202/</URL>
      <Description>SUSE CVE CVE-2015-0202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0248/</URL>
      <Description>SUSE CVE CVE-2015-0248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0251/</URL>
      <Description>SUSE CVE CVE-2015-0251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3184/</URL>
      <Description>SUSE CVE CVE-2015-3184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3187/</URL>
      <Description>SUSE CVE CVE-2015-3187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5259/</URL>
      <Description>SUSE CVE CVE-2015-5259 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5343/</URL>
      <Description>SUSE CVE CVE-2015-5343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2167/</URL>
      <Description>SUSE CVE CVE-2016-2167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2168/</URL>
      <Description>SUSE CVE CVE-2016-2168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8734/</URL>
      <Description>SUSE CVE CVE-2016-8734 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_gnome_keyring-1-0-1.9.5-1.1">
      <FullProductName ProductID="libsvn_auth_gnome_keyring-1-0-1.9.5-1.1">libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_kwallet-1-0-1.9.5-1.1">
      <FullProductName ProductID="libsvn_auth_kwallet-1-0-1.9.5-1.1">libsvn_auth_kwallet-1-0-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-1.9.5-1.1">
      <FullProductName ProductID="subversion-1.9.5-1.1">subversion-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-bash-completion-1.9.5-1.1">
      <FullProductName ProductID="subversion-bash-completion-1.9.5-1.1">subversion-bash-completion-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-devel-1.9.5-1.1">
      <FullProductName ProductID="subversion-devel-1.9.5-1.1">subversion-devel-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-perl-1.9.5-1.1">
      <FullProductName ProductID="subversion-perl-1.9.5-1.1">subversion-perl-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-python-1.9.5-1.1">
      <FullProductName ProductID="subversion-python-1.9.5-1.1">subversion-python-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-python-ctypes-1.9.5-1.1">
      <FullProductName ProductID="subversion-python-ctypes-1.9.5-1.1">subversion-python-ctypes-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-ruby-1.9.5-1.1">
      <FullProductName ProductID="subversion-ruby-1.9.5-1.1">subversion-ruby-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-server-1.9.5-1.1">
      <FullProductName ProductID="subversion-server-1.9.5-1.1">subversion-server-1.9.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-tools-1.9.5-1.1">
      <FullProductName ProductID="subversion-tools-1.9.5-1.1">subversion-tools-1.9.5-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsvn_auth_gnome_keyring-1-0-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1">libsvn_auth_gnome_keyring-1-0-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvn_auth_kwallet-1-0-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1">libsvn_auth_kwallet-1-0-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-1.9.5-1.1">subversion-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-bash-completion-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1">subversion-bash-completion-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-devel-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-devel-1.9.5-1.1">subversion-devel-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-perl-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-perl-1.9.5-1.1">subversion-perl-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-python-1.9.5-1.1">subversion-python-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-ctypes-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1">subversion-python-ctypes-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-ruby-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1">subversion-ruby-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-server-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-server-1.9.5-1.1">subversion-server-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-tools-1.9.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-tools-1.9.5-1.1">subversion-tools-1.9.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.</Note>
    </Notes>
    <CVE>CVE-2009-2411</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2411.html</URL>
        <Description>CVE-2009-2411</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/528714</URL>
        <Description>SUSE Bug 528714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802057</URL>
        <Description>SUSE Bug 802057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.</Note>
    </Notes>
    <CVE>CVE-2010-3315</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3315.html</URL>
        <Description>CVE-2010-3315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/649861</URL>
        <Description>SUSE Bug 649861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.</Note>
    </Notes>
    <CVE>CVE-2010-4539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4539.html</URL>
        <Description>CVE-2010-4539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662030</URL>
        <Description>SUSE Bug 662030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.</Note>
    </Notes>
    <CVE>CVE-2010-4644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4644.html</URL>
        <Description>CVE-2010-4644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662030</URL>
        <Description>SUSE Bug 662030</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.</Note>
    </Notes>
    <CVE>CVE-2011-0715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0715.html</URL>
        <Description>CVE-2011-0715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/676949</URL>
        <Description>SUSE Bug 676949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.</Note>
    </Notes>
    <CVE>CVE-2011-1752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1752.html</URL>
        <Description>CVE-2011-1752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/698205</URL>
        <Description>SUSE Bug 698205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.</Note>
    </Notes>
    <CVE>CVE-2011-1783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1783.html</URL>
        <Description>CVE-2011-1783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/698205</URL>
        <Description>SUSE Bug 698205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.</Note>
    </Notes>
    <CVE>CVE-2011-1921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1921.html</URL>
        <Description>CVE-2011-1921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/698205</URL>
        <Description>SUSE Bug 698205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.</Note>
    </Notes>
    <CVE>CVE-2013-1845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1845.html</URL>
        <Description>CVE-2013-1845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813913</URL>
        <Description>SUSE Bug 813913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.</Note>
    </Notes>
    <CVE>CVE-2013-1846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1846.html</URL>
        <Description>CVE-2013-1846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813913</URL>
        <Description>SUSE Bug 813913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.</Note>
    </Notes>
    <CVE>CVE-2013-1847</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1847.html</URL>
        <Description>CVE-2013-1847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813913</URL>
        <Description>SUSE Bug 813913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.</Note>
    </Notes>
    <CVE>CVE-2013-1849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1849.html</URL>
        <Description>CVE-2013-1849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813913</URL>
        <Description>SUSE Bug 813913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.</Note>
    </Notes>
    <CVE>CVE-2013-1884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1884.html</URL>
        <Description>CVE-2013-1884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813913</URL>
        <Description>SUSE Bug 813913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.</Note>
    </Notes>
    <CVE>CVE-2013-1968</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1968.html</URL>
        <Description>CVE-2013-1968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/821505</URL>
        <Description>SUSE Bug 821505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.</Note>
    </Notes>
    <CVE>CVE-2013-2088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2088.html</URL>
        <Description>CVE-2013-2088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/821505</URL>
        <Description>SUSE Bug 821505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.</Note>
    </Notes>
    <CVE>CVE-2013-2112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2112.html</URL>
        <Description>CVE-2013-2112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/821505</URL>
        <Description>SUSE Bug 821505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.</Note>
    </Notes>
    <CVE>CVE-2013-4131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4131.html</URL>
        <Description>CVE-2013-4131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/830031</URL>
        <Description>SUSE Bug 830031</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.</Note>
    </Notes>
    <CVE>CVE-2013-4246</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4246.html</URL>
        <Description>CVE-2013-4246</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836245</URL>
        <Description>SUSE Bug 836245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file.  NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.</Note>
    </Notes>
    <CVE>CVE-2013-4262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.4</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4262.html</URL>
        <Description>CVE-2013-4262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/844201</URL>
        <Description>SUSE Bug 844201</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.</Note>
    </Notes>
    <CVE>CVE-2013-4277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4277.html</URL>
        <Description>CVE-2013-4277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/836245</URL>
        <Description>SUSE Bug 836245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.</Note>
    </Notes>
    <CVE>CVE-2013-4505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4505.html</URL>
        <Description>CVE-2013-4505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850667</URL>
        <Description>SUSE Bug 850667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850747</URL>
        <Description>SUSE Bug 850747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862459</URL>
        <Description>SUSE Bug 862459</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.</Note>
    </Notes>
    <CVE>CVE-2013-4558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4558.html</URL>
        <Description>CVE-2013-4558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850667</URL>
        <Description>SUSE Bug 850667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850747</URL>
        <Description>SUSE Bug 850747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862459</URL>
        <Description>SUSE Bug 862459</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.</Note>
    </Notes>
    <CVE>CVE-2014-0032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0032.html</URL>
        <Description>CVE-2014-0032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862459</URL>
        <Description>SUSE Bug 862459</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2014-3522</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3522.html</URL>
        <Description>CVE-2014-3522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890511</URL>
        <Description>SUSE Bug 890511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.</Note>
    </Notes>
    <CVE>CVE-2014-3528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3528.html</URL>
        <Description>CVE-2014-3528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889849</URL>
        <Description>SUSE Bug 889849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890511</URL>
        <Description>SUSE Bug 890511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.</Note>
    </Notes>
    <CVE>CVE-2014-3580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3580.html</URL>
        <Description>CVE-2014-3580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909935</URL>
        <Description>SUSE Bug 909935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910376</URL>
        <Description>SUSE Bug 910376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.</Note>
    </Notes>
    <CVE>CVE-2014-8108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8108.html</URL>
        <Description>CVE-2014-8108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909935</URL>
        <Description>SUSE Bug 909935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.</Note>
    </Notes>
    <CVE>CVE-2015-0202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0202.html</URL>
        <Description>CVE-2015-0202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923793</URL>
        <Description>SUSE Bug 923793</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.</Note>
    </Notes>
    <CVE>CVE-2015-0248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0248.html</URL>
        <Description>CVE-2015-0248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923794</URL>
        <Description>SUSE Bug 923794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.</Note>
    </Notes>
    <CVE>CVE-2015-0251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0251.html</URL>
        <Description>CVE-2015-0251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923795</URL>
        <Description>SUSE Bug 923795</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.</Note>
    </Notes>
    <CVE>CVE-2015-3184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3184.html</URL>
        <Description>CVE-2015-3184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938723</URL>
        <Description>SUSE Bug 938723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939514</URL>
        <Description>SUSE Bug 939514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939516</URL>
        <Description>SUSE Bug 939516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.</Note>
    </Notes>
    <CVE>CVE-2015-3187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3187.html</URL>
        <Description>CVE-2015-3187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939517</URL>
        <Description>SUSE Bug 939517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2015-5259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5259.html</URL>
        <Description>CVE-2015-5259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958299</URL>
        <Description>SUSE Bug 958299</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-5343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5343.html</URL>
        <Description>CVE-2015-5343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958300</URL>
        <Description>SUSE Bug 958300</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.</Note>
    </Notes>
    <CVE>CVE-2016-2167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2167.html</URL>
        <Description>CVE-2016-2167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976849</URL>
        <Description>SUSE Bug 976849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.</Note>
    </Notes>
    <CVE>CVE-2016-2168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2168.html</URL>
        <Description>CVE-2016-2168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976850</URL>
        <Description>SUSE Bug 976850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.</Note>
    </Notes>
    <CVE>CVE-2016-8734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-ctypes-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.9.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.9.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8734.html</URL>
        <Description>CVE-2016-8734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011552</URL>
        <Description>SUSE Bug 1011552</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
