Headline
RHSA-2022:2199: Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS
- CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage
- CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
Synopsis
Important: .NET 6.0 security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 6.0.105 and .NET Core Runtime 6.0.5.
Security Fix(es):
- dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267)
- dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117)
- dotnet: parsing HTML causes Denial of Service (CVE-2022-29145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2083647 - CVE-2022-29117 dotnet: malicious content causes high CPU and memory usage
- BZ - 2083649 - CVE-2022-29145 dotnet: parsing HTML causes Denial of Service
- BZ - 2083650 - CVE-2022-23267 dotnet: excess memory allocation via HttpClient causes DoS
Red Hat Enterprise Linux for x86_64 8
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
x86_64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: b4dafa0eda5f8e7a71dd37822b8e9790b10225d8067d0b5268c0417bddc46bdd
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: f76c42614020300eb60b3cc27026878cae9e9b64a743813825bf7da6546fbb46
dotnet-6.0.105-1.el8_6.x86_64.rpm
SHA-256: f547d3915a091fc8b79c3e8b23a433b824c306da07a1f8982b714a32c728992b
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: be2320eade8b5596c41b0ad7cb12def377d02e21a014e84c3822c7b51c820b02
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 396458feccae3e8e3dc93d93a1e5400195167b0b7c80413fc349d13884381d73
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 95a2398b4ced5eef3d3c65b9bd7d50027ec4e52ded20f82674f00c1767a12da3
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: e449ec7df1972cb5d17c2ae3ed35b51a6d084313a830da6de7a92e115b5d5fed
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5eaf83af5876f6a97f76521448dbaf955b4c7c2a275e7ee8d2f9b67aae3c9af1
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 8ac7ae98d93759153c19bd605211f38d9aacf70ede578f63024ce00ccedf09d4
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 4cf5ec27e3edaf72eb851724e9ebb2906a0389cf4c42da5d736fb894d1d53e11
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 1ac4948c45b9d0ae85643cb564d3be21fa25db7e9a3b99071b7d211234b56cc9
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
x86_64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: b4dafa0eda5f8e7a71dd37822b8e9790b10225d8067d0b5268c0417bddc46bdd
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: f76c42614020300eb60b3cc27026878cae9e9b64a743813825bf7da6546fbb46
dotnet-6.0.105-1.el8_6.x86_64.rpm
SHA-256: f547d3915a091fc8b79c3e8b23a433b824c306da07a1f8982b714a32c728992b
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: be2320eade8b5596c41b0ad7cb12def377d02e21a014e84c3822c7b51c820b02
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 396458feccae3e8e3dc93d93a1e5400195167b0b7c80413fc349d13884381d73
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 95a2398b4ced5eef3d3c65b9bd7d50027ec4e52ded20f82674f00c1767a12da3
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: e449ec7df1972cb5d17c2ae3ed35b51a6d084313a830da6de7a92e115b5d5fed
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5eaf83af5876f6a97f76521448dbaf955b4c7c2a275e7ee8d2f9b67aae3c9af1
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 8ac7ae98d93759153c19bd605211f38d9aacf70ede578f63024ce00ccedf09d4
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 4cf5ec27e3edaf72eb851724e9ebb2906a0389cf4c42da5d736fb894d1d53e11
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 1ac4948c45b9d0ae85643cb564d3be21fa25db7e9a3b99071b7d211234b56cc9
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
x86_64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: b4dafa0eda5f8e7a71dd37822b8e9790b10225d8067d0b5268c0417bddc46bdd
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: f76c42614020300eb60b3cc27026878cae9e9b64a743813825bf7da6546fbb46
dotnet-6.0.105-1.el8_6.x86_64.rpm
SHA-256: f547d3915a091fc8b79c3e8b23a433b824c306da07a1f8982b714a32c728992b
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: be2320eade8b5596c41b0ad7cb12def377d02e21a014e84c3822c7b51c820b02
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 396458feccae3e8e3dc93d93a1e5400195167b0b7c80413fc349d13884381d73
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 95a2398b4ced5eef3d3c65b9bd7d50027ec4e52ded20f82674f00c1767a12da3
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: e449ec7df1972cb5d17c2ae3ed35b51a6d084313a830da6de7a92e115b5d5fed
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5eaf83af5876f6a97f76521448dbaf955b4c7c2a275e7ee8d2f9b67aae3c9af1
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 8ac7ae98d93759153c19bd605211f38d9aacf70ede578f63024ce00ccedf09d4
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 4cf5ec27e3edaf72eb851724e9ebb2906a0389cf4c42da5d736fb894d1d53e11
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 1ac4948c45b9d0ae85643cb564d3be21fa25db7e9a3b99071b7d211234b56cc9
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
s390x
aspnetcore-runtime-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 3443b207edc290bd0eb535c67499134d1fe82acba4e86c64c17810ce6e424c3e
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: b641ced0c713d85530916861b0f56d899b3b3f370c6076cb5fbdc8ddd03c5a09
dotnet-6.0.105-1.el8_6.s390x.rpm
SHA-256: fa414907ebcedb1b69ac71515b4cff8eaf405e7c93ba01c26464ed3b7ef92f93
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8acbd835b874d415a8672bdc95852b68a6edcd6b99539b2e39683b6fd447c227
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 2b7e19376a80c30c3df173ba9e6c352d7af54e35cca0bddf32b65cd68ca43f2b
dotnet-host-6.0.5-1.el8_6.s390x.rpm
SHA-256: f331d086470267f2046f853f4111e5e0eb2201144beb6d0a8ab2eaff8694e7a0
dotnet-host-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8464aff3bccc30f09ba0d17f7efbfabb5c2f396300d0f960d0dbcfead9620497
dotnet-hostfxr-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: c15014afd2c54377efb96477b140bed19a42c2670536f08576e7a276946c32a0
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 1fcec681be7b4e6de91b89280f02faa0b66646d10f9a68474c2fddd693eaaca9
dotnet-runtime-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: cbc0dd440704f25403b307f8e4e80c8978034c1c5b99c92e4ce24644c247bbc8
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 82bf52989b5766ea385d10bb759937fab8dfb5d024a5db510b68de37fc3ed651
dotnet-sdk-6.0-6.0.105-1.el8_6.s390x.rpm
SHA-256: b5701b830f04e68163ee559492731536706a031a3344a246813555808f4b775d
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 65c5e12888c0696ef600c7bbd5b64ca65f74ac4274f805d978168cee494b1694
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8384e2dab47f06a5c6993d9a07b5ef5113199660b1ede35d46c2b8a75c496bce
dotnet-templates-6.0-6.0.105-1.el8_6.s390x.rpm
SHA-256: 7c4543cce56c93802037713f5e04fdee0a0f22d30fa545139ab78568aa873038
dotnet6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 891286ea5ad1316c50e1ec2d6548f3d0731f6c54ce935d73c8e58a45e93815a6
dotnet6.0-debugsource-6.0.105-1.el8_6.s390x.rpm
SHA-256: 93ee45d023a2b3b35a5195e80e4f849ddecb339750ace421e3c81dfc97cea67c
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.s390x.rpm
SHA-256: a86f531d2b6474f42a08f5c3ff84d2425a394edf83c66b2aea564074045f1f90
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
s390x
aspnetcore-runtime-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 3443b207edc290bd0eb535c67499134d1fe82acba4e86c64c17810ce6e424c3e
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: b641ced0c713d85530916861b0f56d899b3b3f370c6076cb5fbdc8ddd03c5a09
dotnet-6.0.105-1.el8_6.s390x.rpm
SHA-256: fa414907ebcedb1b69ac71515b4cff8eaf405e7c93ba01c26464ed3b7ef92f93
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8acbd835b874d415a8672bdc95852b68a6edcd6b99539b2e39683b6fd447c227
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 2b7e19376a80c30c3df173ba9e6c352d7af54e35cca0bddf32b65cd68ca43f2b
dotnet-host-6.0.5-1.el8_6.s390x.rpm
SHA-256: f331d086470267f2046f853f4111e5e0eb2201144beb6d0a8ab2eaff8694e7a0
dotnet-host-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8464aff3bccc30f09ba0d17f7efbfabb5c2f396300d0f960d0dbcfead9620497
dotnet-hostfxr-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: c15014afd2c54377efb96477b140bed19a42c2670536f08576e7a276946c32a0
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 1fcec681be7b4e6de91b89280f02faa0b66646d10f9a68474c2fddd693eaaca9
dotnet-runtime-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: cbc0dd440704f25403b307f8e4e80c8978034c1c5b99c92e4ce24644c247bbc8
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 82bf52989b5766ea385d10bb759937fab8dfb5d024a5db510b68de37fc3ed651
dotnet-sdk-6.0-6.0.105-1.el8_6.s390x.rpm
SHA-256: b5701b830f04e68163ee559492731536706a031a3344a246813555808f4b775d
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 65c5e12888c0696ef600c7bbd5b64ca65f74ac4274f805d978168cee494b1694
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8384e2dab47f06a5c6993d9a07b5ef5113199660b1ede35d46c2b8a75c496bce
dotnet-templates-6.0-6.0.105-1.el8_6.s390x.rpm
SHA-256: 7c4543cce56c93802037713f5e04fdee0a0f22d30fa545139ab78568aa873038
dotnet6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 891286ea5ad1316c50e1ec2d6548f3d0731f6c54ce935d73c8e58a45e93815a6
dotnet6.0-debugsource-6.0.105-1.el8_6.s390x.rpm
SHA-256: 93ee45d023a2b3b35a5195e80e4f849ddecb339750ace421e3c81dfc97cea67c
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.s390x.rpm
SHA-256: a86f531d2b6474f42a08f5c3ff84d2425a394edf83c66b2aea564074045f1f90
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
x86_64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: b4dafa0eda5f8e7a71dd37822b8e9790b10225d8067d0b5268c0417bddc46bdd
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: f76c42614020300eb60b3cc27026878cae9e9b64a743813825bf7da6546fbb46
dotnet-6.0.105-1.el8_6.x86_64.rpm
SHA-256: f547d3915a091fc8b79c3e8b23a433b824c306da07a1f8982b714a32c728992b
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: be2320eade8b5596c41b0ad7cb12def377d02e21a014e84c3822c7b51c820b02
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 396458feccae3e8e3dc93d93a1e5400195167b0b7c80413fc349d13884381d73
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 95a2398b4ced5eef3d3c65b9bd7d50027ec4e52ded20f82674f00c1767a12da3
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: e449ec7df1972cb5d17c2ae3ed35b51a6d084313a830da6de7a92e115b5d5fed
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5eaf83af5876f6a97f76521448dbaf955b4c7c2a275e7ee8d2f9b67aae3c9af1
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 8ac7ae98d93759153c19bd605211f38d9aacf70ede578f63024ce00ccedf09d4
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 4cf5ec27e3edaf72eb851724e9ebb2906a0389cf4c42da5d736fb894d1d53e11
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 1ac4948c45b9d0ae85643cb564d3be21fa25db7e9a3b99071b7d211234b56cc9
Red Hat Enterprise Linux for ARM 64 8
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
aarch64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: fbfc112796d156eb167f85fdd4fba9199bf5c6836f13353cdb583e3892ad93b2
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a020253175eebb147d1dae8cd11f6b72898b5c56b53d572109e85c661c7c0e48
dotnet-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 37cfa7fc2ac972c80a3afff4b9f444ae7515df35c07b2e8de4be2c1553a3afd2
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: e66035ceca8a273242fe9ee173d5f081378096333b241a76dd8f958385c14280
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 53838265637f9cf0cb48054fbcc2058da5fafe77d02aa91c68602971ecf5f489
dotnet-host-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 1995cb295097559990ac5455252f97e6087b5a1abb9bd45735fb235105c897d7
dotnet-host-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a73c2b1f09230733205f1ec167def9de30952b6ec4556ab8c57a42d268f1923d
dotnet-hostfxr-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 109ccc056b6c409750ec1dc709f4e7de0ca924bc74c281cd059b14ad33821fce
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 0659cf54f88901745312ab12864644f63a3208669f5c7a34ba4a60a319e5a0eb
dotnet-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 71e8708453cca04305422d9b6dafbe3af55e68683a3167de30e65cdbf69a2039
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 128da21a5fde8b0e92809be935c883dbac252a84dc87911e4c5853831f4f38ab
dotnet-sdk-6.0-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3c32c7ebf7e9fc61f61e94d880aae333f3143890b96f6f3270c8d72e7c6a2a5e
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: a635354408b5beb4c4903c8f25e4019ea779bcca0c6bfd02554cbf3ce2e262a3
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 2339ea73c8d3ca9d8588ec00a6de07b16511bcef77ac9712837b1502c64e8226
dotnet-templates-6.0-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 228f8ddefbacd6e37874813e32c215f238d22971053da653e8af12b4d080ca43
dotnet6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3e8a1f75c4632149ccd532d118e7159fffa265b981c9b70e5f7737bea789aa8d
dotnet6.0-debugsource-6.0.105-1.el8_6.aarch64.rpm
SHA-256: e31d18a016e7d2301992b1d13be10d14c09074a1ed67f4d60981aaed66bc6988
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.aarch64.rpm
SHA-256: df09a36c2ff5c8d9589b804637e6ffd4614ac29a5a8081ab8cc9769e4555b324
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 0b56252a73c0f1e2ea8420167f3b127eb49814c97f3ec5896d3b64f5f7a47d54
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 53838265637f9cf0cb48054fbcc2058da5fafe77d02aa91c68602971ecf5f489
dotnet-host-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a73c2b1f09230733205f1ec167def9de30952b6ec4556ab8c57a42d268f1923d
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 0659cf54f88901745312ab12864644f63a3208669f5c7a34ba4a60a319e5a0eb
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 128da21a5fde8b0e92809be935c883dbac252a84dc87911e4c5853831f4f38ab
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: a635354408b5beb4c4903c8f25e4019ea779bcca0c6bfd02554cbf3ce2e262a3
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 5d3ea01d564118f9a653941862c6292ce87d90a2dac651e6eed42ace1f62de5c
dotnet6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3e8a1f75c4632149ccd532d118e7159fffa265b981c9b70e5f7737bea789aa8d
dotnet6.0-debugsource-6.0.105-1.el8_6.aarch64.rpm
SHA-256: e31d18a016e7d2301992b1d13be10d14c09074a1ed67f4d60981aaed66bc6988
Red Hat CodeReady Linux Builder for IBM z Systems 8
SRPM
s390x
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 2b7e19376a80c30c3df173ba9e6c352d7af54e35cca0bddf32b65cd68ca43f2b
dotnet-host-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8464aff3bccc30f09ba0d17f7efbfabb5c2f396300d0f960d0dbcfead9620497
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 1fcec681be7b4e6de91b89280f02faa0b66646d10f9a68474c2fddd693eaaca9
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 82bf52989b5766ea385d10bb759937fab8dfb5d024a5db510b68de37fc3ed651
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 65c5e12888c0696ef600c7bbd5b64ca65f74ac4274f805d978168cee494b1694
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.s390x.rpm
SHA-256: 97bfc26d101ddce7f0a673cf2d56e17c6b05cccde3eb1d1bc0a984c5e0cdf9b5
dotnet6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 891286ea5ad1316c50e1ec2d6548f3d0731f6c54ce935d73c8e58a45e93815a6
dotnet6.0-debugsource-6.0.105-1.el8_6.s390x.rpm
SHA-256: 93ee45d023a2b3b35a5195e80e4f849ddecb339750ace421e3c81dfc97cea67c
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
aarch64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: fbfc112796d156eb167f85fdd4fba9199bf5c6836f13353cdb583e3892ad93b2
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a020253175eebb147d1dae8cd11f6b72898b5c56b53d572109e85c661c7c0e48
dotnet-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 37cfa7fc2ac972c80a3afff4b9f444ae7515df35c07b2e8de4be2c1553a3afd2
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: e66035ceca8a273242fe9ee173d5f081378096333b241a76dd8f958385c14280
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 53838265637f9cf0cb48054fbcc2058da5fafe77d02aa91c68602971ecf5f489
dotnet-host-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 1995cb295097559990ac5455252f97e6087b5a1abb9bd45735fb235105c897d7
dotnet-host-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a73c2b1f09230733205f1ec167def9de30952b6ec4556ab8c57a42d268f1923d
dotnet-hostfxr-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 109ccc056b6c409750ec1dc709f4e7de0ca924bc74c281cd059b14ad33821fce
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 0659cf54f88901745312ab12864644f63a3208669f5c7a34ba4a60a319e5a0eb
dotnet-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 71e8708453cca04305422d9b6dafbe3af55e68683a3167de30e65cdbf69a2039
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 128da21a5fde8b0e92809be935c883dbac252a84dc87911e4c5853831f4f38ab
dotnet-sdk-6.0-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3c32c7ebf7e9fc61f61e94d880aae333f3143890b96f6f3270c8d72e7c6a2a5e
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: a635354408b5beb4c4903c8f25e4019ea779bcca0c6bfd02554cbf3ce2e262a3
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 2339ea73c8d3ca9d8588ec00a6de07b16511bcef77ac9712837b1502c64e8226
dotnet-templates-6.0-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 228f8ddefbacd6e37874813e32c215f238d22971053da653e8af12b4d080ca43
dotnet6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3e8a1f75c4632149ccd532d118e7159fffa265b981c9b70e5f7737bea789aa8d
dotnet6.0-debugsource-6.0.105-1.el8_6.aarch64.rpm
SHA-256: e31d18a016e7d2301992b1d13be10d14c09074a1ed67f4d60981aaed66bc6988
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.aarch64.rpm
SHA-256: df09a36c2ff5c8d9589b804637e6ffd4614ac29a5a8081ab8cc9769e4555b324
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6
SRPM
dotnet6.0-6.0.105-1.el8_6.src.rpm
SHA-256: 77d869f5a76636ecd9b4db6ea3943c5aa87120c96c3ff3c70d93f333dd8610bb
x86_64
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: b4dafa0eda5f8e7a71dd37822b8e9790b10225d8067d0b5268c0417bddc46bdd
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: f76c42614020300eb60b3cc27026878cae9e9b64a743813825bf7da6546fbb46
dotnet-6.0.105-1.el8_6.x86_64.rpm
SHA-256: f547d3915a091fc8b79c3e8b23a433b824c306da07a1f8982b714a32c728992b
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: be2320eade8b5596c41b0ad7cb12def377d02e21a014e84c3822c7b51c820b02
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 396458feccae3e8e3dc93d93a1e5400195167b0b7c80413fc349d13884381d73
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 95a2398b4ced5eef3d3c65b9bd7d50027ec4e52ded20f82674f00c1767a12da3
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: e449ec7df1972cb5d17c2ae3ed35b51a6d084313a830da6de7a92e115b5d5fed
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5eaf83af5876f6a97f76521448dbaf955b4c7c2a275e7ee8d2f9b67aae3c9af1
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 8ac7ae98d93759153c19bd605211f38d9aacf70ede578f63024ce00ccedf09d4
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 4cf5ec27e3edaf72eb851724e9ebb2906a0389cf4c42da5d736fb894d1d53e11
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 1ac4948c45b9d0ae85643cb564d3be21fa25db7e9a3b99071b7d211234b56cc9
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 304e19493240ddcf137f4711654e577abb51fcf460781db6fffa4d84cada84c9
dotnet-host-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: bd7ad6dd70c585062d34457492ea43c1f47730db1114b49798897dfdab0caa87
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 552dc502ea27c23f41445ca9d3a93311ead5b755cb0d18e897a4bfbf8319d2e5
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.x86_64.rpm
SHA-256: 25851d691087a3a7e70d5fa66842bc8968749cf9d14cf157df3b9c0cb6c595e8
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: b2325ae0b1e299cd5b09f1f41a3b808b79b11c63a78710bb38930811badd56ac
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 0b56252a73c0f1e2ea8420167f3b127eb49814c97f3ec5896d3b64f5f7a47d54
dotnet6.0-debuginfo-6.0.105-1.el8_6.x86_64.rpm
SHA-256: 5218130a120f4fd974fdf0f7c3f82652dcdf513a053af5b168621708d4c3d130
dotnet6.0-debugsource-6.0.105-1.el8_6.x86_64.rpm
SHA-256: d0a99ae62fe31291b3d1e09a22d1014f3418637c333fa5ea94e036c64a9a2a09
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6
SRPM
s390x
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 2b7e19376a80c30c3df173ba9e6c352d7af54e35cca0bddf32b65cd68ca43f2b
dotnet-host-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 8464aff3bccc30f09ba0d17f7efbfabb5c2f396300d0f960d0dbcfead9620497
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 1fcec681be7b4e6de91b89280f02faa0b66646d10f9a68474c2fddd693eaaca9
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.s390x.rpm
SHA-256: 82bf52989b5766ea385d10bb759937fab8dfb5d024a5db510b68de37fc3ed651
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 65c5e12888c0696ef600c7bbd5b64ca65f74ac4274f805d978168cee494b1694
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.s390x.rpm
SHA-256: 97bfc26d101ddce7f0a673cf2d56e17c6b05cccde3eb1d1bc0a984c5e0cdf9b5
dotnet6.0-debuginfo-6.0.105-1.el8_6.s390x.rpm
SHA-256: 891286ea5ad1316c50e1ec2d6548f3d0731f6c54ce935d73c8e58a45e93815a6
dotnet6.0-debugsource-6.0.105-1.el8_6.s390x.rpm
SHA-256: 93ee45d023a2b3b35a5195e80e4f849ddecb339750ace421e3c81dfc97cea67c
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
dotnet-apphost-pack-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 53838265637f9cf0cb48054fbcc2058da5fafe77d02aa91c68602971ecf5f489
dotnet-host-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: a73c2b1f09230733205f1ec167def9de30952b6ec4556ab8c57a42d268f1923d
dotnet-hostfxr-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 0659cf54f88901745312ab12864644f63a3208669f5c7a34ba4a60a319e5a0eb
dotnet-runtime-6.0-debuginfo-6.0.5-1.el8_6.aarch64.rpm
SHA-256: 128da21a5fde8b0e92809be935c883dbac252a84dc87911e4c5853831f4f38ab
dotnet-sdk-6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: a635354408b5beb4c4903c8f25e4019ea779bcca0c6bfd02554cbf3ce2e262a3
dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 5d3ea01d564118f9a653941862c6292ce87d90a2dac651e6eed42ace1f62de5c
dotnet6.0-debuginfo-6.0.105-1.el8_6.aarch64.rpm
SHA-256: 3e8a1f75c4632149ccd532d118e7159fffa265b981c9b70e5f7737bea789aa8d
dotnet6.0-debugsource-6.0.105-1.el8_6.aarch64.rpm
SHA-256: e31d18a016e7d2301992b1d13be10d14c09074a1ed67f4d60981aaed66bc6988
Related news
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 5.0 and .NET Core 3.1 where a malicious client can cause a Denial of Service via excess memory allocations through HttpClient. ### Affected software * Any .NET 6.0 application running on .NET 6.0.4 or earlier. * Any .NET 5.0 application running .NET 5.0.16 or earlier. * Any .NET Core 3.1 applicaiton running on .NET Core 3.1.24 or earlier. ### Patches * If you're using .NET Core 6.0, you should download and install Runtime 6.0.5 or SDK 6.0.105 (for Visual Studio 2022 v17.0) or SDK 6.0.203 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0. * If you're using .NET 5.0, you should download and install Runtime 5.0.17 or SDK 5.0.214 (for Visual Studio 2019 v1...
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 where a malicious client can manipulate cookies and cause a Denial of Service. ### Affected software * Any .NET 6.0 application running on .NET 6.0.4 or earlier. * Any .NET 5.0 application running .NET 5.0.16 or earlier. * Any .NET Core 3.1 application running on .NET Core 3.1.24 or earlier. #### Affected packages **.NET Core 3.1** | Package name | Affected versions | Patched versions | |---------------------------------------------------|-------------------|------------------| | Microsoft.Owin.Security.Cookies | <=4.21 | 4.22 | | Microsoft.Owin.Security | <=4.21 ...
Red Hat Security Advisory 2022-4588-01 - .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 6.0.105 and .NET Core Runtime 6.0.5. Issues addressed include a denial of service vulnerability.
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
Red Hat Security Advisory 2022-2200-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2200-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2200-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 5.0.214 and .NET Core Runtime 5.0.17. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2199-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 6.0.105 and .NET Core Runtime 6.0.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2199-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 6.0.105 and .NET Core Runtime 6.0.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2199-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 6.0.105 and .NET Core Runtime 6.0.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2202-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.419 and .NET Core Runtime 3.1.25. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2202-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.419 and .NET Core Runtime 3.1.25. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-2202-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.419 and .NET Core Runtime 3.1.25. Issues addressed include a denial of service vulnerability.
An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET 5.0 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET 5.0 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
An update for .NET 6.0 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23267: dotnet: excess memory allocation via HttpClient causes DoS * CVE-2022-29117: dotnet: malicious content causes high CPU and memory usage * CVE-2022-29145: dotnet: parsing HTML causes Denial of Service
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29117.
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-29117, CVE-2022-29145.
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29117.
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29145.