{"id":"MGASA-2015-0490","summary":"Updated subversion packages fix security vulnerabilities","details":"Updated subversion packages fix security vulnerability:\n\nSubversion's httpd servers are vulnerable to a remotely triggerable heap-based\nbuffer overflow and out-of-bounds read caused by an integer overflow when\nparsing skel-encoded request bodies (CVE-2015-5343).\n\nThis allows remote attackers with write access to a repository to cause a\ndenial of service or possibly execute arbitrary code under the context of the\nhttpd process.  32-bit server versions are vulnerable to both the\ndenial-of-service attack and possible arbitrary code execution.  64-bit server\nversions are only vulnerable to the denial-of-service attack.\n","modified":"2026-04-16T01:45:47.592015350Z","published":"2015-12-28T19:23:26Z","upstream":["CVE-2015-5343"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0490.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17353"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-dev/201512.mbox/%3CCAP_GPNieJGPDbf=nmbSdf+CTMZ=5pREoqwnDNvO80mfAKNaY7Q@mail.gmail.com%3E"},{"type":"WEB","url":"http://svn.apache.org/repos/asf/subversion/tags/1.8.15/CHANGES"},{"type":"ADVISORY","url":"http://subversion.apache.org/security/CVE-2015-5343-advisory.txt"},{"type":"WEB","url":"https://www.debian.org/security/2015/dsa-3424"}],"affected":[{"package":{"name":"subversion","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/subversion?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.15-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0490.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}