{"id":24398,"date":"2022-05-13T20:28:57","date_gmt":"2022-05-13T16:28:57","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/167165\/RHSA-2022-2236-01.txt"},"modified":"2022-05-14T10:48:40","modified_gmt":"2022-05-14T06:18:40","slug":"red-hat-security-advisory-2022-2236-01","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/red-hat-security-advisory-2022-2236-01\/","title":{"rendered":"Red Hat Security Advisory 2022-2236-01"},"content":{"rendered":"<p dir=\"ltr\">&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>\nHash: SHA256<\/p>\n<p dir=\"ltr\">====================================================================<br \/>\nRed Hat Security Advisory<\/p>\n<p dir=\"ltr\">Synopsis: Important: subversion:1.10 security update<br \/>\nAdvisory ID: RHSA-2022:2236-01<br \/>\nProduct: Red Hat Enterprise Linux<br \/>\nAdvisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2022:2236<br \/>\nIssue date: 2022-05-12<br \/>\nCVE Names: CVE-2022-24070<br \/>\n====================================================================<br \/>\n1. Summary:<\/p>\n<p dir=\"ltr\">An update for the subversion:1.10 module is now available for Red Hat<br \/>\nEnterprise Linux 8.2 Extended Update Support.<\/p>\n<p dir=\"ltr\">Red Hat Product Security has rated this update as having a security impact<br \/>\nof Important. A Common Vulnerability Scoring System (CVSS) base score,<br \/>\nwhich gives a detailed severity rating, is available for each vulnerability<br \/>\nfrom the CVE link(s) in the References section.<\/p>\n<p dir=\"ltr\">2. Relevant releases\/architectures:<\/p>\n<p dir=\"ltr\">Red Hat Enterprise Linux AppStream EUS (v. 8.2) &#8211; aarch64, noarch, ppc64le, s390x, x86_64<\/p>\n<p dir=\"ltr\">3. Description:<\/p>\n<p dir=\"ltr\">Subversion (SVN) is a concurrent version control system which enables one<br \/>\nor more users to collaborate in developing and maintaining a hierarchy of<br \/>\nfiles and directories while keeping a history of all changes.<\/p>\n<p dir=\"ltr\">Security Fix(es):<\/p>\n<p dir=\"ltr\">* subversion: Subversion&#8217;s mod_dav_svn is vulnerable to memory corruption<br \/>\n(CVE-2022-24070)<\/p>\n<p dir=\"ltr\">For more details about the security issue(s), including the impact, a CVSS<br \/>\nscore, acknowledgments, and other related information, refer to the CVE<br \/>\npage(s) listed in the References section.<\/p>\n<p dir=\"ltr\">4. Solution:<\/p>\n<p dir=\"ltr\">For details on how to apply this update, which includes the changes<br \/>\ndescribed in this advisory, refer to:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/articles\/11258<\/p>\n<p dir=\"ltr\">After installing the updated packages, for the update to take effect, you<br \/>\nmust restart the httpd daemon, if you are using mod_dav_svn, and the<br \/>\nsvnserve daemon, if you are serving Subversion repositories via the svn:\/\/<br \/>\nprotocol.<\/p>\n<p dir=\"ltr\">5. Bugs fixed (https:\/\/bugzilla.redhat.com\/):<\/p>\n<p dir=\"ltr\">2074772 &#8211; CVE-2022-24070 subversion: Subversion&#8217;s mod_dav_svn is vulnerable to memory corruption<\/p>\n<p dir=\"ltr\">6. Package List:<\/p>\n<p dir=\"ltr\">Red Hat Enterprise Linux AppStream EUS (v. 8.2):<\/p>\n<p dir=\"ltr\">Source:<br \/>\nlibserf-1.3.9-9.module+el8.2.0+9887+08558108.src.rpm<br \/>\nsubversion-1.10.2-3.module+el8.2.0+15168+f36597c9.src.rpm<br \/>\nutf8proc-2.1.1-5.module+el8.2.0+9887+08558108.src.rpm<\/p>\n<p dir=\"ltr\">aarch64:<br \/>\nlibserf-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm<br \/>\nlibserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm<br \/>\nlibserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm<br \/>\nmod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nmod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nsubversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm<br \/>\nutf8proc-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm<br \/>\nutf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm<br \/>\nutf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm<\/p>\n<p dir=\"ltr\">noarch:<br \/>\nsubversion-javahl-1.10.2-3.module+el8.2.0+15168+f36597c9.noarch.rpm<\/p>\n<p dir=\"ltr\">ppc64le:<br \/>\nlibserf-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm<br \/>\nlibserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm<br \/>\nlibserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm<br \/>\nmod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nmod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nsubversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm<br \/>\nutf8proc-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm<br \/>\nutf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm<br \/>\nutf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm<\/p>\n<p dir=\"ltr\">s390x:<br \/>\nlibserf-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm<br \/>\nlibserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm<br \/>\nlibserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm<br \/>\nmod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nmod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nsubversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm<br \/>\nutf8proc-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm<br \/>\nutf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm<br \/>\nutf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm<\/p>\n<p dir=\"ltr\">x86_64:<br \/>\nlibserf-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm<br \/>\nlibserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm<br \/>\nlibserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm<br \/>\nmod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nmod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nsubversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm<br \/>\nutf8proc-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm<br \/>\nutf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm<br \/>\nutf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm<\/p>\n<p dir=\"ltr\">These packages are GPG signed by Red Hat for security. Our key and<br \/>\ndetails on how to verify the signature are available from<br \/>\nhttps:\/\/access.redhat.com\/security\/team\/key\/<\/p>\n<p dir=\"ltr\">7. References:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/security\/cve\/CVE-2022-24070<br \/>\nhttps:\/\/access.redhat.com\/security\/updates\/classification\/#important<\/p>\n<p dir=\"ltr\">8. Contact:<\/p>\n<p dir=\"ltr\">The Red Hat security contact is &lt;secalert@redhat.com&gt;. More contact<br \/>\ndetails at https:\/\/access.redhat.com\/security\/team\/contact\/<\/p>\n<p dir=\"ltr\">Copyright 2022 Red Hat, Inc.<br \/>\n&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>\nVersion: GnuPG v1<\/p>\n<p dir=\"ltr\">iQIVAwUBYn3iatzjgjWX9erEAQhybhAAnCLwKUV8Qd0P8bMoriwLdUGnpK41vAmm<br \/>\nfOGrmwAd09DNs\/HW\/8eum8jjjuEVUx\/n+Vp0A8BMa2hDqJ+Zm+dSq++A0pGSgr2\/<br \/>\nCGBn3BsyM+uyGapkKLYrHCqnD6arvck2CaEtDNyl0\/FmI6ZyOLB0g9gkADTit4me<br \/>\nqMKrZs303c2udoP5JriRdQ1yFJKVLkt32ssmljsJBUzbIMmt3zZAH0r640wMq5vZ<br \/>\nAVdRxrIgmKkToAUD5frD7WzF60hvQ5bBGkXXdjWBDnDTOscWXksiTuucTxTzEfh5<br \/>\nqNlb5I09oPgIZsp563Ry+BYzd8VqVCFXOu90L7UyBVJZbn6\/Y\/WO9jZ8SmXza+0Z<br \/>\ntPeR2mUPeNKQ8NOFxFuzCnN+reOfyKzCeRfUR\/7FvQ5FxcrymgWpeOUkUIfjUaCR<br \/>\nfymyByBdfxfn3YalL\/WD2V0i6VEHlbfKdrn6\/Wk1gP0jtsf11Avz94ydkZxo0Cv6<br \/>\nIAZfQmkcAKdYjQ\/93dDEFalqqADOD+bOjaBizWfRcLHo+h+SL1MjxSo9l8cL2Y0i<br \/>\nly1o4XnyxMk+SyZbe4v2coVLKuDGpUUxT0YwSplyvedX1ULVYRWvi\/Q86Mh9rPmf<br \/>\n39fsdM62D\/mLOTiNy3JIn2gS0ir3yRDr1Y1GkZE6SLMJxFOY9+RSVvYhTLCLSLv3<br \/>\nQ5krjcKXb3o=C+KB<br \/>\n&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<br \/>\n&#8212;<br \/>\nRHSA-announce mailing list<br \/>\nRHSA-announce@redhat.com<br \/>\nhttps:\/\/listman.redhat.com\/mailman\/listinfo\/rhsa-announce<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211; Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: subversion:1.10 security update Advisory ID: RHSA-2022:2236-01 Product: Red Hat Enterprise Linux Advisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2022:2236 Issue date: 2022-05-12 CVE Names: CVE-2022-24070 ==================================================================== 1. Summary: An update for the subversion:1.10 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-24398","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/24398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=24398"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/24398\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=24398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=24398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=24398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}