[ALSA-2022:6523] Moderate: .NET Core 3.1 security and bugfix update
Type:
security
Severity:
moderate
Release date:
2022-10-14
Description:
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 3.1.423 and .NET Runtime 3.1.29. Security Fix(es): * dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion. (CVE-2022-38013) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
x86_64 dotnet-sdk-3.1-source-built-artifacts-3.1.423-1.el8_6.x86_64.rpm 212ca85310935a49690d7b21fef34887865f1513c72dad71cd5957c0f9278fef
x86_64 aspnetcore-targeting-pack-3.1-3.1.29-1.el8_6.x86_64.rpm 466041ef0dcb20f2758f91bd13f673398dfc992bdd037f0b89d2a1634107d290
x86_64 dotnet-apphost-pack-3.1-3.1.29-1.el8_6.x86_64.rpm 5f9bcca12e710a23a07a2e0d6bc4a5ea563e51400e02741928484de4c8ccac2e
x86_64 aspnetcore-runtime-3.1-3.1.29-1.el8_6.x86_64.rpm 7f074fa18c5d0b961a5fee8691576ac7a1e6334a398890efd4be35388be2a70d
x86_64 dotnet-hostfxr-3.1-3.1.29-1.el8_6.x86_64.rpm 8ee7ac7f9bb56dd3514ba9242b5f4402dced13adb647fd89de29e43d4cb95f8b
x86_64 dotnet-runtime-3.1-3.1.29-1.el8_6.x86_64.rpm 915358b5681e1e19d77d5f9018e001bf2d97d9c7fcf2538e2b699b0abdca9c19
x86_64 dotnet-targeting-pack-3.1-3.1.29-1.el8_6.x86_64.rpm 981012b99eda6b5ab61227723bccab0c26868ba413ffc055ceaff978673973dc
x86_64 dotnet-sdk-3.1-3.1.423-1.el8_6.x86_64.rpm df4741ec1e6059a3e97173e49d02973093f2a54b0da508b6e036ce2f17618c41
x86_64 dotnet-templates-3.1-3.1.423-1.el8_6.x86_64.rpm f8469ba96a101e19d2b2a55a3010b91abeadb745cdd14896cf8d87824286cf4e
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.