7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
0.95 High
EPSS
Percentile
99.3%
New subversion packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
patches/packages/subversion-1.7.22-i486-1_slack14.1.txz: Upgraded.
Subversion servers and clients are vulnerable to a remotely triggerable
heap-based buffer overflow and out-of-bounds read that may allow remote
attackers to cause a denial of service or possibly execute arbitrary code
under the context of the targeted process.
For more information, see:
https://vulners.com/cve/CVE-2015-5343
(* Security fix *)
Where to find the new packages:
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/subversion-1.7.22-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/subversion-1.7.22-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/subversion-1.7.22-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/subversion-1.7.22-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/subversion-1.9.3-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/subversion-1.9.3-x86_64-1.txz
MD5 signatures:
Slackware 14.0 package:
53279c2f041b612a6ca4335251077429 subversion-1.7.22-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
ec95cc6199fac28e97d4da10c81aaaa7 subversion-1.7.22-x86_64-1_slack14.0.txz
Slackware 14.1 package:
3c45b34f17e5023c7ba10b59b36a68c9 subversion-1.7.22-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
91a71f907100aa8d2e341bdc670b7b40 subversion-1.7.22-x86_64-1_slack14.1.txz
Slackware -current package:
18ac4b37b203dc0a8bc1f6534c89d4e2 d/subversion-1.9.3-i586-1.txz
Slackware x86_64 -current package:
81ce97396cde969b5ffc2b6d1c8935e9 d/subversion-1.9.3-x86_64-1.txz
Installation instructions:
Upgrade the package as root:
> upgradepkg subversion-1.7.22-i486-1_slack14.1.txz
7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
0.95 High
EPSS
Percentile
99.3%