vulnerability
Rocky Linux: CVE-2022-24070: subversion-1.14 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Apr 12, 2022 | Mar 12, 2024 | Aug 13, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 12, 2022
Added
Mar 12, 2024
Modified
Aug 13, 2025
Description
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
Solutions
rocky-upgrade-libserfrocky-upgrade-libserf-debuginforocky-upgrade-libserf-debugsourcerocky-upgrade-mod_dav_svnrocky-upgrade-mod_dav_svn-debuginforocky-upgrade-python3-subversionrocky-upgrade-python3-subversion-debuginforocky-upgrade-subversionrocky-upgrade-subversion-debuginforocky-upgrade-subversion-debugsourcerocky-upgrade-subversion-develrocky-upgrade-subversion-devel-debuginforocky-upgrade-subversion-gnomerocky-upgrade-subversion-gnome-debuginforocky-upgrade-subversion-libsrocky-upgrade-subversion-libs-debuginforocky-upgrade-subversion-perlrocky-upgrade-subversion-perl-debuginforocky-upgrade-subversion-toolsrocky-upgrade-subversion-tools-debuginforocky-upgrade-utf8procrocky-upgrade-utf8proc-debuginforocky-upgrade-utf8proc-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.