The following flaw was reported in Subversion: Subversion's httpd servers are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow when parsing skel-encoded request bodies. This allows remote attackers with write access to a repository to cause a denial of service or possibly execute arbitrary code under the context of the httpd process. 32-bit server versions are vulnerable to both the denial-of-service attack and possible arbitrary code execution. 64-bit server versions are only vulnerable to the denial-of-service attack. Acknowledgements: Red Hat would like to thank the Apache Software Foundation for reporting this issue. Upstream acknowledges Ivan Zhakov of VisualSVN as the original reporter.
Created attachment 1103851 [details] CVE-2015-5343-1.8.14.patch
Created attachment 1103852 [details] CVE-2015-5343-1.9.2.patch
Public via upstream advisory: External References: https://subversion.apache.org/security/CVE-2015-5343-advisory.txt
Created subversion tracking bugs for this issue: Affects: fedora-all [bug 1292015]
subversion-1.9.3-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
subversion-1.8.15-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.