CVE-2022-38013 Affecting netstandard-targeting-pack-2.1 package, versions <0:6.0.109-1.el9_0
Threat Intelligence
EPSS
0.41% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-NETSTANDARDTARGETINGPACK21-5658529
- published 28 May 2023
- disclosed 15 Sep 2022
Introduced: 15 Sep 2022
CVE-2022-38013 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
netstandard-targeting-pack-2.1
to version 0:6.0.109-1.el9_0 or higher.
This issue was patched in ALSA-2022:6521
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream netstandard-targeting-pack-2.1
package and not the netstandard-targeting-pack-2.1
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
.NET Core and Visual Studio Denial of Service Vulnerability
References
- https://errata.almalinux.org/9/ALSA-2022-6521.html
- https://errata.almalinux.org/8/ALSA-2022-6523.html
- https://errata.almalinux.org/8/ALSA-2022-6539.html
- https://access.redhat.com/security/cve/CVE-2022-38013
- https://access.redhat.com/errata/RHSA-2022:6521
- https://access.redhat.com/errata/RHSA-2022:6523
- https://access.redhat.com/errata/RHSA-2022:6539
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/
CVSS Scores
version 3.1