vulnerability
Red Hat: CVE-2024-38229: dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | 2024-10-08 | 2024-10-10 | 2024-10-11 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
2024-10-08
Added
2024-10-10
Modified
2024-10-11
Description
.NET and Visual Studio Remote Code Execution Vulnerability
Solution(s)
redhat-upgrade-aspnetcore-runtime-8-0redhat-upgrade-aspnetcore-runtime-dbg-8-0redhat-upgrade-aspnetcore-targeting-pack-8-0redhat-upgrade-dotnetredhat-upgrade-dotnet-apphost-pack-8-0redhat-upgrade-dotnet-apphost-pack-8-0-debuginforedhat-upgrade-dotnet-hostredhat-upgrade-dotnet-host-debuginforedhat-upgrade-dotnet-hostfxr-8-0redhat-upgrade-dotnet-hostfxr-8-0-debuginforedhat-upgrade-dotnet-runtime-8-0redhat-upgrade-dotnet-runtime-8-0-debuginforedhat-upgrade-dotnet-runtime-dbg-8-0redhat-upgrade-dotnet-sdk-8-0redhat-upgrade-dotnet-sdk-8-0-debuginforedhat-upgrade-dotnet-sdk-8-0-source-built-artifactsredhat-upgrade-dotnet-sdk-dbg-8-0redhat-upgrade-dotnet-targeting-pack-8-0redhat-upgrade-dotnet-templates-8-0redhat-upgrade-dotnet8-0-debuginforedhat-upgrade-dotnet8-0-debugsourceredhat-upgrade-netstandard-targeting-pack-2-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.