The following flaw was reported in Subversion: Subversion servers and clients are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow in the svn:// protocol parser. This allows remote attackers to cause a denial of service or possibly execute arbitrary code under the context of the targeted process. Acknowledgements: Red Hat would like to thank the Apache Software Foundation for reporting this issue. Upstream acknowledges Ivan Zhakov of VisualSVN as the original reporter.
Created attachment 1103853 [details] CVE-2015-5259-1.9.2.patch
Public via upstream advisory: External References: https://subversion.apache.org/security/CVE-2015-5259-advisory.txt
Created subversion tracking bugs for this issue: Affects: fedora-all [bug 1292015]
subversion-1.9.3-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
subversion-1.8.15-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.