Bug 1289959 (CVE-2015-5343)

Summary: CVE-2015-5343 subversion: (mod_dav_svn) integer overflow when parsing skel-encoded request bodies
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jorton, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: subversion 1.8.15, subversion 1.9.3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-12-17 03:14:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1292015    
Bug Blocks: 1289964    
Attachments:
Description Flags
CVE-2015-5343-1.8.14.patch
none
CVE-2015-5343-1.9.2.patch none

Description Martin Prpič 2015-12-09 12:20:43 UTC
The following flaw was reported in Subversion:

Subversion's httpd servers are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow when parsing skel-encoded request bodies.

This allows remote attackers with write access to a repository to cause a denial of service or possibly execute arbitrary code under the context of the httpd process. 32-bit server versions are vulnerable to both the denial-of-service attack and possible arbitrary code execution. 64-bit server versions are only vulnerable to the denial-of-service attack.

Acknowledgements:

Red Hat would like to thank the Apache Software Foundation for reporting this issue. Upstream acknowledges Ivan Zhakov of VisualSVN as the original reporter.

Comment 2 Martin Prpič 2015-12-09 12:24:00 UTC
Created attachment 1103851 [details]
CVE-2015-5343-1.8.14.patch

Comment 3 Martin Prpič 2015-12-09 12:24:02 UTC
Created attachment 1103852 [details]
CVE-2015-5343-1.9.2.patch

Comment 5 Martin Prpič 2015-12-16 08:28:41 UTC
Public via upstream advisory:

External References:

https://subversion.apache.org/security/CVE-2015-5343-advisory.txt

Comment 6 Martin Prpič 2015-12-16 08:30:25 UTC
Created subversion tracking bugs for this issue:

Affects: fedora-all [bug 1292015]

Comment 7 Fedora Update System 2015-12-22 22:03:14 UTC
subversion-1.9.3-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2016-02-29 22:21:39 UTC
subversion-1.8.15-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.