CVE-2015-5259

NameCVE-2015-5259
DescriptionInteger overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
subversion (PTS)buster, buster (security)1.10.4-1+deb10u3fixed
bullseye (security), bullseye1.14.1-3+deb11u1fixed
bookworm1.14.2-4fixed
trixie, sid1.14.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
subversionsourcesqueeze(not affected)
subversionsourcewheezy(not affected)
subversionsourcejessie(not affected)
subversionsource(unstable)1.9.3-1

Notes

[jessie] - subversion <not-affected> (Only affects 1.9.0 through 1.9.2 (inclusive))
[wheezy] - subversion <not-affected> (Only affects 1.9.0 through 1.9.2 (inclusive))
[squeeze] - subversion <not-affected> (Only affects 1.9.0 through 1.9.2 (inclusive))
https://subversion.apache.org/security/CVE-2015-5259-advisory.txt

Search for package or bug name: Reporting problems