Lucene search

K
rockyRockylinux Product ErrataRLSA-2024:3340
HistoryJun 14, 2024 - 1:59 p.m.

.NET 7.0 security update

2024-06-1413:59:30
Rockylinux Product Errata
errata.rockylinux.org
.net 7.0
security update
rocky linux 8
cvss
vulnerability
cve
.net framework
security fix
denial of service
stack buffer overrun
asp.net core
http2
sdk 7.0.119
runtime 7.0.19
clr
managed software framework
unix

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.9 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.0%

An update is available for dotnet7.0.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19.

Security Fix(es):

  • dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)

  • dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.9 Medium

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.0%