[CLSA-2022:1654175590] Fixed CVE-2022-24070 in subversion-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1
Type:
security
Severity:
Important
Release date:
2022-06-02
Description:
- CVE-2022-24070: fix use-after-free of object-pools when used as httpd module
Updated packages:
  • subversion-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:fad71a6cdb04a80ca0f263ed1bb2d6f8578b844a
  • mod_dav_svn-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:e7081d2bc0d2245a2431e63df1b245f417d610c4
  • utf8proc-2.1.1-5.module_el8.5.0+2053+ac338b6d.x86_64.rpm
    sha:0f8cdb27527cfae781cd53e7c3742503c66c7edd
  • subversion-javahl-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.noarch.rpm
    sha:ae9c501f71beec0a636c73b0d2eafac9f2f2fd2b
  • subversion-tools-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:aadc2863ece4e00097162dd1f746660e8c821d4b
  • subversion-devel-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:60ce2f51783f7b2a88abe4962d435cbd1657649c
  • libserf-1.3.9-9.module_el8.5.0+2053+ac338b6d.x86_64.rpm
    sha:4431bf71c1c9e4ed1c6e9db7ad560d024cf6b2bd
  • subversion-libs-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:1f3134c79591346b42a4e541fdc1939ac23a3c3d
  • subversion-ruby-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:316fbc92a6ed3f4e4e7e891267391d603bd9795f
  • subversion-gnome-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:5fb84ce86bd3c964b0d3fc6e906531ad4f693dd9
  • subversion-perl-1.10.2-4.module_el8.5.0+2053+ac338b6d.tuxcare.els1.x86_64.rpm
    sha:def3152d90bcef07208b9c596cfdc2f5e8e36301
  • utf8proc-devel-2.1.1-5.module_el8.5.0+2053+ac338b6d.x86_64.rpm
    sha:01dd83fb176e24af1595c3ea6c7e838f672c239b
  • libserf-devel-1.3.9-9.module_el8.5.0+2053+ac338b6d.x86_64.rpm
    sha:d833d1bd0d92fd310da158d2ef2a97b1c036333f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.