{"id":24386,"date":"2022-05-12T23:50:01","date_gmt":"2022-05-12T19:50:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/167135\/RHSA-2022-2202-01.txt"},"modified":"2022-05-14T10:35:04","modified_gmt":"2022-05-14T06:05:04","slug":"red-hat-security-advisory-2022-2202-01","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/red-hat-security-advisory-2022-2202-01\/","title":{"rendered":"Red Hat Security Advisory 2022-2202-01"},"content":{"rendered":"<p dir=\"ltr\">&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>\nHash: SHA256<\/p>\n<p dir=\"ltr\">====================================================================<br \/>\nRed Hat Security Advisory<\/p>\n<p dir=\"ltr\">Synopsis: Important: .NET Core 3.1 security, bug fix, and enhancement update<br \/>\nAdvisory ID: RHSA-2022:2202-01<br \/>\nProduct: Red Hat Enterprise Linux<br \/>\nAdvisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2022:2202<br \/>\nIssue date: 2022-05-11<br \/>\nCVE Names: CVE-2022-23267 CVE-2022-29117 CVE-2022-29145<br \/>\n====================================================================<br \/>\n1. Summary:<\/p>\n<p dir=\"ltr\">An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux<br \/>\n8.<\/p>\n<p dir=\"ltr\">Red Hat Product Security has rated this update as having a security impact<br \/>\nof Important. A Common Vulnerability Scoring System (CVSS) base score,<br \/>\nwhich gives a detailed severity rating, is available for each vulnerability<br \/>\nfrom the CVE link(s) in the References section.<\/p>\n<p dir=\"ltr\">2. Relevant releases\/architectures:<\/p>\n<p dir=\"ltr\">Red Hat CodeReady Linux Builder (v. 8) &#8211; x86_64<br \/>\nRed Hat Enterprise Linux AppStream (v. 8) &#8211; x86_64<\/p>\n<p dir=\"ltr\">3. Description:<\/p>\n<p dir=\"ltr\">.NET Core is a managed-software framework. It implements a subset of the<br \/>\n.NET<br \/>\nframework APIs and several new APIs, and it includes a CLR implementation.<\/p>\n<p dir=\"ltr\">New versions of .NET Core that address a security vulnerability are now<br \/>\navailable. The updated versions are .NET Core SDK 3.1.419 and .NET Core<br \/>\nRuntime 3.1.25.<\/p>\n<p dir=\"ltr\">Security Fix(es):<\/p>\n<p dir=\"ltr\">* dotnet: excess memory allocation via HttpClient causes DoS<br \/>\n(CVE-2022-23267)<\/p>\n<p dir=\"ltr\">* dotnet: malicious content causes high CPU and memory usage<br \/>\n(CVE-2022-29117)<\/p>\n<p dir=\"ltr\">* dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)<\/p>\n<p dir=\"ltr\">For more details about the security issue(s), including the impact, a CVSS<br \/>\nscore, acknowledgments, and other related information, refer to the CVE<br \/>\npage(s) listed in the References section.<\/p>\n<p dir=\"ltr\">4. Solution:<\/p>\n<p dir=\"ltr\">For details on how to apply this update, which includes the changes<br \/>\ndescribed in this advisory, refer to:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/articles\/11258<\/p>\n<p dir=\"ltr\">5. Bugs fixed (https:\/\/bugzilla.redhat.com\/):<\/p>\n<p dir=\"ltr\">2083647 &#8211; CVE-2022-29117 dotnet: malicious content causes high CPU and memory usage<br \/>\n2083649 &#8211; CVE-2022-29145 dotnet: parsing HTML causes Denial of Service<br \/>\n2083650 &#8211; CVE-2022-23267 dotnet: excess memory allocation via HttpClient causes DoS<\/p>\n<p dir=\"ltr\">6. Package List:<\/p>\n<p dir=\"ltr\">Red Hat Enterprise Linux AppStream (v. 8):<\/p>\n<p dir=\"ltr\">Source:<br \/>\ndotnet3.1-3.1.419-1.el8_6.src.rpm<\/p>\n<p dir=\"ltr\">x86_64:<br \/>\naspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\naspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-apphost-pack-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-hostfxr-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-runtime-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet-sdk-3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet3.1-debugsource-3.1.419-1.el8_6.x86_64.rpm<\/p>\n<p dir=\"ltr\">Red Hat CodeReady Linux Builder (v. 8):<\/p>\n<p dir=\"ltr\">x86_64:<br \/>\ndotnet-apphost-pack-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-hostfxr-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-runtime-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm<br \/>\ndotnet-sdk-3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet-sdk-3.1-source-built-artifacts-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm<br \/>\ndotnet3.1-debugsource-3.1.419-1.el8_6.x86_64.rpm<\/p>\n<p dir=\"ltr\">These packages are GPG signed by Red Hat for security. Our key and<br \/>\ndetails on how to verify the signature are available from<br \/>\nhttps:\/\/access.redhat.com\/security\/team\/key\/<\/p>\n<p dir=\"ltr\">7. References:<\/p>\n<p dir=\"ltr\">https:\/\/access.redhat.com\/security\/cve\/CVE-2022-23267<br \/>\nhttps:\/\/access.redhat.com\/security\/cve\/CVE-2022-29117<br \/>\nhttps:\/\/access.redhat.com\/security\/cve\/CVE-2022-29145<br \/>\nhttps:\/\/access.redhat.com\/security\/updates\/classification\/#important<\/p>\n<p dir=\"ltr\">8. Contact:<\/p>\n<p dir=\"ltr\">The Red Hat security contact is &lt;secalert@redhat.com&gt;. More contact<br \/>\ndetails at https:\/\/access.redhat.com\/security\/team\/contact\/<\/p>\n<p dir=\"ltr\">Copyright 2022 Red Hat, Inc.<br \/>\n&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>\nVersion: GnuPG v1<\/p>\n<p dir=\"ltr\">iQIVAwUBYnw2TNzjgjWX9erEAQiM9A\/+JBPm6xW7iFYN+VkWRX4UhDBN9aW8nfqT<br \/>\n9JxtUdAgOVNAhxeZz+UYevvYaN7Ee93iEnuy1qkLnyq1BEpIwJhsB5WVFYCKMR\/5<br \/>\nEv1bL+L+UaJJho9yqk9WPsvC2NT56ix0qdVg7ijmfK200\/ZDTD316F73nzCAlB42<br \/>\nfKs0k3iAG7ph8kSp2Z1lC42P3xmEyOCkYFPdHcz5ZgHyTw8gga0Y0bcc0IfOqodC<br \/>\nceETRU47uvtPVJkbKYFc8rF2hmpYCLDOB07LJSxGCZML2\/Cds9GRnV3EcrLv\/Pi5<br \/>\nCKyL\/lD5ScqsEV+\/sdyL44aJcV4JRCBKQ\/PzdJJHhMccKJBK+eTk7MMme3ugLsBj<br \/>\n+qCsI918V\/TY1JA3f0IclQPpNlFvsAojOxhvn\/4MFcf5X9dH5u+HedmYLzfW7H9x<br \/>\ntOMGkOg8+nZWjQT5fnT+pgOGMndBVsi4agBQy7bGnnVEMDfSj6FwI9yt65QI0BAn<br \/>\njrZpU2WgDg9IhpI7lNlgcpgYn5Rw1vc820vNwMobHAUYM6GKw3RQgFfSINysz5\/6<br \/>\nca2otjnaOdfdp3dU3OYg1GvnLVlRvE3Y71191gtAZKU2vmr8lpeYx31iRp3u+lvE<br \/>\nxo8ROnOq7MKa6Rv+YxLX8hSPdTd5hje5qWcsYyLliNw7qweDtCixPI4S15thpjMS<br \/>\nUwquNOdkn08=OLmk<br \/>\n&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<br \/>\n&#8212;<br \/>\nRHSA-announce mailing list<br \/>\nRHSA-announce@redhat.com<br \/>\nhttps:\/\/listman.redhat.com\/mailman\/listinfo\/rhsa-announce<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211; Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: .NET Core 3.1 security, bug fix, and enhancement update Advisory ID: RHSA-2022:2202-01 Product: Red Hat Enterprise Linux Advisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2022:2202 Issue date: 2022-05-11 CVE Names: CVE-2022-23267 CVE-2022-29117 CVE-2022-29145 ==================================================================== 1. Summary: An update for .NET Core 3.1 is now available for Red &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-24386","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/24386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=24386"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/24386\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=24386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=24386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=24386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}