Red Hat Bugzilla – Bug 1289958
CVE-2015-5259 subversion: integer overflow in the svn:// protocol parser
Last modified: 2016-02-29 17:21:45 EST
The following flaw was reported in Subversion:
Subversion servers and clients are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow in the svn:// protocol parser.
This allows remote attackers to cause a denial of service or possibly execute arbitrary code under the context of the targeted process.
Red Hat would like to thank the Apache Software Foundation for reporting this issue. Upstream acknowledges Ivan Zhakov of VisualSVN as the original reporter.
Created attachment 1103853 [details]
Public via upstream advisory:
Created subversion tracking bugs for this issue:
Affects: fedora-all [bug 1292015]
subversion-1.9.3-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
subversion-1.8.15-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.