First published: Wed Jun 14 2023(Updated: )
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.<br>New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.118 and .NET Runtime 6.0.18.<br>The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.118). (BZ#2212379)<br>Security Fix(es):<br><li> dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331)</li> <li> dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337)</li> <li> dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128)</li> <li> dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dotnet6.0 | <6.0.118-1.el9_2 | 6.0.118-1.el9_2 |
redhat/aspnetcore-runtime | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/aspnetcore-targeting-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-apphost-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-apphost-pack | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-hostfxr | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-hostfxr | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-runtime | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-runtime | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-sdk | <6.0-6.0.118-1.el9_2 | 6.0-6.0.118-1.el9_2 |
redhat/dotnet-sdk | <6.0-debuginfo-6.0.118-1.el9_2 | 6.0-debuginfo-6.0.118-1.el9_2 |
redhat/dotnet-targeting-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-templates | <6.0-6.0.118-1.el9_2 | 6.0-6.0.118-1.el9_2 |
redhat/dotnet6.0-debuginfo | <6.0.118-1.el9_2 | 6.0.118-1.el9_2 |
redhat/dotnet6.0-debugsource | <6.0.118-1.el9_2 | 6.0.118-1.el9_2 |
redhat/aspnetcore-runtime | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/aspnetcore-targeting-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-apphost-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-apphost-pack | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-hostfxr | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-hostfxr | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-runtime | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-runtime | <6.0-debuginfo-6.0.18-1.el9_2 | 6.0-debuginfo-6.0.18-1.el9_2 |
redhat/dotnet-sdk | <6.0-6.0.118-1.el9_2 | 6.0-6.0.118-1.el9_2 |
redhat/dotnet-sdk | <6.0-debuginfo-6.0.118-1.el9_2 | 6.0-debuginfo-6.0.118-1.el9_2 |
redhat/dotnet-targeting-pack | <6.0-6.0.18-1.el9_2 | 6.0-6.0.18-1.el9_2 |
redhat/dotnet-templates | <6.0-6.0.118-1.el9_2 | 6.0-6.0.118-1.el9_2 |
redhat/dotnet6.0-debuginfo | <6.0.118-1.el9_2 | 6.0.118-1.el9_2 |
redhat/dotnet6.0-debugsource | <6.0.118-1.el9_2 | 6.0.118-1.el9_2 |
redhat/aspnetcore-runtime | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/aspnetcore-targeting-pack | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/dotnet-apphost-pack | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/dotnet-apphost-pack | <6.0-debuginfo-6.0.18-1.el9_2.aa | 6.0-debuginfo-6.0.18-1.el9_2.aa |
redhat/dotnet-hostfxr | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/dotnet-hostfxr | <6.0-debuginfo-6.0.18-1.el9_2.aa | 6.0-debuginfo-6.0.18-1.el9_2.aa |
redhat/dotnet-runtime | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/dotnet-runtime | <6.0-debuginfo-6.0.18-1.el9_2.aa | 6.0-debuginfo-6.0.18-1.el9_2.aa |
redhat/dotnet-sdk | <6.0-6.0.118-1.el9_2.aa | 6.0-6.0.118-1.el9_2.aa |
redhat/dotnet-sdk | <6.0-debuginfo-6.0.118-1.el9_2.aa | 6.0-debuginfo-6.0.118-1.el9_2.aa |
redhat/dotnet-targeting-pack | <6.0-6.0.18-1.el9_2.aa | 6.0-6.0.18-1.el9_2.aa |
redhat/dotnet-templates | <6.0-6.0.118-1.el9_2.aa | 6.0-6.0.118-1.el9_2.aa |
redhat/dotnet6.0-debuginfo | <6.0.118-1.el9_2.aa | 6.0.118-1.el9_2.aa |
redhat/dotnet6.0-debugsource | <6.0.118-1.el9_2.aa | 6.0.118-1.el9_2.aa |
redhat/dotnet-sdk | <6.0-source-built-artifacts-6.0.118-1.el9_2 | 6.0-source-built-artifacts-6.0.118-1.el9_2 |
redhat/dotnet-sdk | <6.0-source-built-artifacts-6.0.118-1.el9_2.aa | 6.0-source-built-artifacts-6.0.118-1.el9_2.aa |
redhat/dotnet-sdk | <6.0-source-built-artifacts-6.0.118-1.el9_2 | 6.0-source-built-artifacts-6.0.118-1.el9_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:3581 is classified as critical.
To fix RHSA-2023:3581, update to the patched versions: .NET SDK 6.0.118 and related packages.
Affected software includes .NET SDK 6.0.118, aspnetcore-runtime, dotnet-runtime, and several other .NET related packages.
Users are recommended to apply the security updates as soon as possible to mitigate potential vulnerabilities.
Yes, the specific versions to upgrade to are .NET SDK 6.0.118 and various updated versions of associated packages.