Important: .NET 5.0 on RHEL 7 security and bugfix update

Related Vulnerabilities: CVE-2022-23267   CVE-2022-29117   CVE-2022-29145  

Synopsis

Important: .NET 5.0 on RHEL 7 security and bugfix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for .NET 5.0 is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17.

Security Fix(es):

  • dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
  • dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
  • dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • dotNET on RHEL (for RHEL Workstation) 1 x86_64

Fixes

  • BZ - 2083647 - CVE-2022-29117 dotnet: malicious content causes high CPU and memory usage
  • BZ - 2083649 - CVE-2022-29145 dotnet: parsing HTML causes Denial of Service
  • BZ - 2083650 - CVE-2022-23267 dotnet: excess memory allocation via HttpClient causes DoS