vulnerability
Red Hat: CVE-2022-24070: CVE-2022-24070 subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Apr 12, 2022 | May 13, 2022 | Sep 16, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 12, 2022
Added
May 13, 2022
Modified
Sep 16, 2025
Description
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
Solutions
redhat-upgrade-libserfredhat-upgrade-libserf-debuginforedhat-upgrade-libserf-debugsourceredhat-upgrade-mod_dav_svnredhat-upgrade-mod_dav_svn-debuginforedhat-upgrade-python3-subversionredhat-upgrade-python3-subversion-debuginforedhat-upgrade-subversionredhat-upgrade-subversion-debuginforedhat-upgrade-subversion-debugsourceredhat-upgrade-subversion-develredhat-upgrade-subversion-devel-debuginforedhat-upgrade-subversion-gnomeredhat-upgrade-subversion-gnome-debuginforedhat-upgrade-subversion-javahlredhat-upgrade-subversion-libsredhat-upgrade-subversion-libs-debuginforedhat-upgrade-subversion-perlredhat-upgrade-subversion-perl-debuginforedhat-upgrade-subversion-ruby-debuginforedhat-upgrade-subversion-toolsredhat-upgrade-subversion-tools-debuginforedhat-upgrade-utf8procredhat-upgrade-utf8proc-debuginforedhat-upgrade-utf8proc-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.