[ALSA-2022:0830] Important: .NET 5.0 security and bugfix update
Type:
security
Severity:
important
Release date:
2022-03-11
Description:
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address security vulnerabilities are now available. The updated versions are .NET SDK 5.0.212 and .NET Runtime 5.0.15. Security Fix(es): * dotnet: ASP.NET Denial of Service via FormPipeReader (CVE-2022-24464) * dotnet: double parser stack buffer overrun (CVE-2022-24512) * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 dotnet-hostfxr-5.0-5.0.15-1.el8_5.x86_64.rpm 101a44523812ce747c4aec60024e92ec7d6f7e27af73b06ec3f844890504a486
x86_64 dotnet-runtime-5.0-5.0.15-1.el8_5.x86_64.rpm 3c01fb4177320dc744699fb1f344acd06891dd5b1425a25e8b418e1e2102e640
x86_64 aspnetcore-targeting-pack-5.0-5.0.15-1.el8_5.x86_64.rpm 5db74ffb686a46a2adad34dd72e493f91bfd346ea9487308c30b9338a23a69ce
x86_64 dotnet-apphost-pack-5.0-5.0.15-1.el8_5.x86_64.rpm 9c4ad01323274cd719df0373ed52136a465e1594ac79620cb3d259e0c45c17cb
x86_64 dotnet-sdk-5.0-5.0.212-1.el8_5.x86_64.rpm aabc90edbb9ed101b0e7366ac752780cf7b99fafa0ad90cc88183c482899beff
x86_64 aspnetcore-runtime-5.0-5.0.15-1.el8_5.x86_64.rpm b2b401a016abbb099c9b5746e92290343c4557b4f5b52259e5f1c21b0164addc
x86_64 dotnet-templates-5.0-5.0.212-1.el8_5.x86_64.rpm b2defd2bc6213b290bee4406fb27269b16a3baf9ed006ce60d0dfbf5058859cb
x86_64 dotnet-sdk-5.0-source-built-artifacts-5.0.212-1.el8_5.x86_64.rpm b9fb56d928664d6126eb081f7db3b57b45896a2de658efd21589fa2cd8335292
x86_64 dotnet-targeting-pack-5.0-5.0.15-1.el8_5.x86_64.rpm e93d8bf6907bbdfb338c666709ba97d165de03ef58dfa16e63d97dac832d04c1
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.