MGASA-2015-0490

Source
https://advisories.mageia.org/MGASA-2015-0490.html
Import Source
https://advisories.mageia.org/MGASA-2015-0490.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0490
Related
Published
2015-12-28T19:23:26Z
Modified
2022-03-11T19:48:20Z
Summary
Updated subversion packages fix security vulnerabilities
Details

Updated subversion packages fix security vulnerability:

Subversion's httpd servers are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow when parsing skel-encoded request bodies (CVE-2015-5343).

This allows remote attackers with write access to a repository to cause a denial of service or possibly execute arbitrary code under the context of the httpd process. 32-bit server versions are vulnerable to both the denial-of-service attack and possible arbitrary code execution. 64-bit server versions are only vulnerable to the denial-of-service attack.

References
Credits

Affected packages

Mageia:5 / subversion

Package

Name
subversion
Purl
pkg:rpm/mageia/subversion?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.15-1.mga5

Ecosystem specific

{
    "section": "core"
}