Integer overflow in the readstring function in libsvnra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libsvn-java": "1.8.8-1ubuntu3.2", "libsvn-perl": "1.8.8-1ubuntu3.2", "libsvn1": "1.8.8-1ubuntu3.2", "subversion": "1.8.8-1ubuntu3.2", "libsvn-perl-dbgsym": "1.8.8-1ubuntu3.2", "python-subversion-dbgsym": "1.8.8-1ubuntu3.2", "subversion-dbg": "1.8.8-1ubuntu3.2", "ruby-svn": "1.8.8-1ubuntu3.2", "python-subversion": "1.8.8-1ubuntu3.2", "subversion-tools": "1.8.8-1ubuntu3.2", "libsvn-ruby1.8": "1.8.8-1ubuntu3.2", "libsvn-dev": "1.8.8-1ubuntu3.2", "libapache2-mod-svn": "1.8.8-1ubuntu3.2", "libsvn-doc": "1.8.8-1ubuntu3.2", "subversion-dbgsym": "1.8.8-1ubuntu3.2", "libsvn-dev-dbgsym": "1.8.8-1ubuntu3.2", "libapache2-mod-svn-dbgsym": "1.8.8-1ubuntu3.2", "libsvn1-dbgsym": "1.8.8-1ubuntu3.2", "libapache2-svn": "1.8.8-1ubuntu3.2", "libsvn-java-dbgsym": "1.8.8-1ubuntu3.2", "ruby-svn-dbgsym": "1.8.8-1ubuntu3.2", "python-subversion-dbg": "1.8.8-1ubuntu3.2" } ] }