<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11412</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11412</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-2448/</URL>
      <Description>SUSE CVE CVE-2007-2448 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9800/</URL>
      <Description>SUSE CVE CVE-2017-9800 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11782/</URL>
      <Description>SUSE CVE CVE-2018-11782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11803/</URL>
      <Description>SUSE CVE CVE-2018-11803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-0203/</URL>
      <Description>SUSE CVE CVE-2019-0203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-17525/</URL>
      <Description>SUSE CVE CVE-2020-17525 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_gnome_keyring-1-0-1.14.1-1.11">
      <FullProductName ProductID="libsvn_auth_gnome_keyring-1-0-1.14.1-1.11">libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsvn_auth_kwallet-1-0-1.14.1-1.11">
      <FullProductName ProductID="libsvn_auth_kwallet-1-0-1.14.1-1.11">libsvn_auth_kwallet-1-0-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-1.14.1-1.11">
      <FullProductName ProductID="subversion-1.14.1-1.11">subversion-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-bash-completion-1.14.1-1.11">
      <FullProductName ProductID="subversion-bash-completion-1.14.1-1.11">subversion-bash-completion-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-devel-1.14.1-1.11">
      <FullProductName ProductID="subversion-devel-1.14.1-1.11">subversion-devel-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-perl-1.14.1-1.11">
      <FullProductName ProductID="subversion-perl-1.14.1-1.11">subversion-perl-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-python-1.14.1-1.11">
      <FullProductName ProductID="subversion-python-1.14.1-1.11">subversion-python-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-ruby-1.14.1-1.11">
      <FullProductName ProductID="subversion-ruby-1.14.1-1.11">subversion-ruby-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-server-1.14.1-1.11">
      <FullProductName ProductID="subversion-server-1.14.1-1.11">subversion-server-1.14.1-1.11</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="subversion-tools-1.14.1-1.11">
      <FullProductName ProductID="subversion-tools-1.14.1-1.11">subversion-tools-1.14.1-1.11</FullProductName>
    </Branch>
    <Relationship ProductReference="libsvn_auth_gnome_keyring-1-0-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11">libsvn_auth_gnome_keyring-1-0-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsvn_auth_kwallet-1-0-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11">libsvn_auth_kwallet-1-0-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-1.14.1-1.11">subversion-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-bash-completion-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11">subversion-bash-completion-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-devel-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-devel-1.14.1-1.11">subversion-devel-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-perl-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-perl-1.14.1-1.11">subversion-perl-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-python-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-python-1.14.1-1.11">subversion-python-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-ruby-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11">subversion-ruby-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-server-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-server-1.14.1-1.11">subversion-server-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="subversion-tools-1.14.1-1.11" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:subversion-tools-1.14.1-1.11">subversion-tools-1.14.1-1.11 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Subversion 1.4.3 and earlier does not properly implement the "partial access" privilege for users who have access to changed paths but not copied paths, which allows remote authenticated users to obtain sensitive information (revision properties) via svn (1) propget, (2) proplist, or (3) propedit.</Note>
    </Notes>
    <CVE>CVE-2007-2448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-2448.html</URL>
        <Description>CVE-2007-2448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/283761</URL>
        <Description>SUSE Bug 283761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.</Note>
    </Notes>
    <CVE>CVE-2017-9800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9800.html</URL>
        <Description>CVE-2017-9800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051362</URL>
        <Description>SUSE Bug 1051362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052481</URL>
        <Description>SUSE Bug 1052481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052696</URL>
        <Description>SUSE Bug 1052696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052932</URL>
        <Description>SUSE Bug 1052932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053364</URL>
        <Description>SUSE Bug 1053364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054653</URL>
        <Description>SUSE Bug 1054653</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066430</URL>
        <Description>SUSE Bug 1066430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071709</URL>
        <Description>SUSE Bug 1071709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128150</URL>
        <Description>SUSE Bug 1128150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.</Note>
    </Notes>
    <CVE>CVE-2018-11782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11782.html</URL>
        <Description>CVE-2018-11782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142743</URL>
        <Description>SUSE Bug 1142743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.</Note>
    </Notes>
    <CVE>CVE-2018-11803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11803.html</URL>
        <Description>CVE-2018-11803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122842</URL>
        <Description>SUSE Bug 1122842</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.</Note>
    </Notes>
    <CVE>CVE-2019-0203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0203.html</URL>
        <Description>CVE-2019-0203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1142721</URL>
        <Description>SUSE Bug 1142721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7</Note>
    </Notes>
    <CVE>CVE-2020-17525</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libsvn_auth_gnome_keyring-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:libsvn_auth_kwallet-1-0-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-bash-completion-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-devel-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-perl-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-python-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-ruby-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-server-1.14.1-1.11</ProductID>
        <ProductID>openSUSE Tumbleweed:subversion-tools-1.14.1-1.11</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-17525.html</URL>
        <Description>CVE-2020-17525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181687</URL>
        <Description>SUSE Bug 1181687</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
