vulnerability
CentOS Linux: CVE-2022-24070: Important: subversion:1.10 security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2022-04-12 | 2022-05-13 | 2023-05-25 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2022-04-12
Added
2022-05-13
Modified
2023-05-25
Description
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
Solution(s)
centos-upgrade-libserfcentos-upgrade-libserf-debuginfocentos-upgrade-libserf-debugsourcecentos-upgrade-mod_dav_svncentos-upgrade-mod_dav_svn-debuginfocentos-upgrade-python3-subversioncentos-upgrade-python3-subversion-debuginfocentos-upgrade-subversioncentos-upgrade-subversion-debuginfocentos-upgrade-subversion-debugsourcecentos-upgrade-subversion-develcentos-upgrade-subversion-devel-debuginfocentos-upgrade-subversion-gnomecentos-upgrade-subversion-gnome-debuginfocentos-upgrade-subversion-javahlcentos-upgrade-subversion-libscentos-upgrade-subversion-libs-debuginfocentos-upgrade-subversion-perlcentos-upgrade-subversion-perl-debuginfocentos-upgrade-subversion-ruby-debuginfocentos-upgrade-subversion-toolscentos-upgrade-subversion-tools-debuginfocentos-upgrade-utf8proccentos-upgrade-utf8proc-debuginfocentos-upgrade-utf8proc-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.