{"id":"RLSA-2022:0827","summary":"Important: .NET Core 3.1 security and bugfix update","details":".NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET that address security vulnerabilities are now available. The updated versions are .NET SDK 3.1.417 and .NET Runtime 3.1.23.\n\nSecurity Fix(es):\n\n* dotnet: ASP.NET Denial of Service via FormPipeReader (CVE-2022-24464)\n\n* dotnet: double parser stack buffer overrun (CVE-2022-24512)\n\n* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T17:45:04.650672Z","published":"2022-03-10T14:44:29Z","upstream":["CVE-2020-8927","CVE-2022-24464","CVE-2022-24512"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:0827"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879225"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061854"}],"affected":[{"package":{"name":"dotnet3.1","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/dotnet3.1?distro=rocky-linux-8-5-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.1.417-1.el8_5"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:0827.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}