[CLSA-2022:1654175372] Fixed CVE-2022-24070 in subversion-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1
Type:
security
Severity:
Important
Release date:
2022-06-02
Description:
- CVE-2022-24070: fix use-after-free of object-pools when used as httpd module
Updated packages:
  • subversion-perl-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:e233bf0d9b7c6d7ec3ba20059d37e9a9baac608b
  • subversion-tools-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:27e39a449480fdb3cb021976a89e06a506771ccf
  • subversion-devel-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:ce5f773e704af12fa2f7828d48254416f22ca0ad
  • libserf-devel-1.3.9-9.module_el8.4.0+2052+ac338b6d.x86_64.rpm
    sha:1f8f7ca3e3bce9c5b0e57359a2756ec5f3b656f6
  • utf8proc-2.1.1-5.module_el8.4.0+2052+ac338b6d.x86_64.rpm
    sha:fe95f6adf573f1f7b9f752c00ef3d41863fc716d
  • libserf-1.3.9-9.module_el8.4.0+2052+ac338b6d.x86_64.rpm
    sha:1f2b1ad964e169315457c3ae8cf0ea470a35e079
  • utf8proc-devel-2.1.1-5.module_el8.4.0+2052+ac338b6d.x86_64.rpm
    sha:15d7709f03c11c42ecfa9f2f800ad74fded37978
  • subversion-gnome-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:e84d5381118aa0ef96b3c9d4b04ea8201da15b70
  • subversion-libs-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:a124ff75cfe1c6bf9552ed504b40432183a2ffe1
  • subversion-ruby-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:bae0c9cd2a6d705efe1bb9e9adea03b027952590
  • subversion-javahl-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.noarch.rpm
    sha:1a9929a7477829aef8578132cbec0a9a43bbf299
  • mod_dav_svn-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:ed47529aebe85cc885366eccf75cddacbbc3039d
  • subversion-1.10.2-4.module_el8.4.0+2052+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:9007ddaf57a81f043e80f7b60de1c3059a55b063
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.