[ALSA-2022:0496] Important: .NET 6.0 security and bugfix update
Type:
security
Severity:
important
Release date:
2022-02-12
Description:
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.102 and .NET Runtime 6.0.2. Security Fix(es): * dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service (CVE-2022-219862) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
Updated packages listed below:
Architecture Package Checksum
x86_64 dotnet-runtime-6.0-6.0.2-1.el8_5.x86_64.rpm 03515f8ef79b3bdff8f9c5593cc6476bfcfe51e022591ed558d2eb6b353d30e6
x86_64 aspnetcore-targeting-pack-6.0-6.0.2-1.el8_5.x86_64.rpm 1e26666e3fa51ae893bac3c23faa930d7a21b70fb42e6947dc76cde68dd466e6
x86_64 dotnet-sdk-6.0-6.0.102-1.el8_5.x86_64.rpm 2d2064b02beacb4ed77ec7032fbbfb4fb316ead60f631e08c80f5efc84bd9109
x86_64 dotnet-host-6.0.2-1.el8_5.x86_64.rpm 3a8cf4ee752762bc64249ac69f19f550002765376d555f120576893d8d3ee147
x86_64 dotnet-hostfxr-6.0-6.0.2-1.el8_5.x86_64.rpm 3d90768a213f243cf36398ac497f936b9c575cd5f3272f2e3b4b97148de32661
x86_64 aspnetcore-runtime-6.0-6.0.2-1.el8_5.x86_64.rpm 68df6d98788d20e4f50e8b87cbf7833abca49dcaa111cec0727855ffb2f50642
x86_64 dotnet-templates-6.0-6.0.102-1.el8_5.x86_64.rpm adb8f431e28d834c6e464513a2dbfcf442c9fead01e7f0d1fa9010f0718ff1cf
x86_64 dotnet-targeting-pack-6.0-6.0.2-1.el8_5.x86_64.rpm b31b62bf0933286911e54db22389e57374360232f5605b477798a25eb643b2cd
x86_64 dotnet-6.0.102-1.el8_5.x86_64.rpm c02d8f843527ff016f5de37f5c92efb57310ddeb593ea1b4a0ea9ff06684f337
x86_64 netstandard-targeting-pack-2.1-6.0.102-1.el8_5.x86_64.rpm c88b7a1e84bf3f57fd9e0f394d22e1dfe0e0c5acf22d4cf4353ef171fbbdc382
x86_64 dotnet-apphost-pack-6.0-6.0.2-1.el8_5.x86_64.rpm e5e301b04420c1e5f063e8604352dd284756e58853ffd2e8e06a7beee0e75b7d
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.