[ALSA-2022:0827] Important: .NET Core 3.1 security and bugfix update
Type:
security
Severity:
important
Release date:
2022-03-11
Description:
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address security vulnerabilities are now available. The updated versions are .NET SDK 3.1.417 and .NET Runtime 3.1.23. Security Fix(es): * dotnet: ASP.NET Denial of Service via FormPipeReader (CVE-2022-24464) * dotnet: double parser stack buffer overrun (CVE-2022-24512) * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages:
  • dotnet-runtime-3.1-3.1.23-1.el8_5.x86_64.rpm
  • dotnet-targeting-pack-3.1-3.1.23-1.el8_5.x86_64.rpm
  • dotnet-templates-3.1-3.1.417-1.el8_5.x86_64.rpm
  • dotnet-sdk-3.1-3.1.417-1.el8_5.x86_64.rpm
  • dotnet-apphost-pack-3.1-3.1.23-1.el8_5.x86_64.rpm
  • dotnet-hostfxr-3.1-3.1.23-1.el8_5.x86_64.rpm
  • aspnetcore-targeting-pack-3.1-3.1.23-1.el8_5.x86_64.rpm
  • aspnetcore-runtime-3.1-3.1.23-1.el8_5.x86_64.rpm
  • dotnet-sdk-3.1-source-built-artifacts-3.1.417-1.el8_5.x86_64.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.