Bug 2185016 (CVE-2023-28260)

Summary: CVE-2023-28260 dotnet: CWD dll hijack vulnerability
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: andrew.slice, bodavis, dbhole, jburrell, kanderso, lvaleeva, omajid, rwagner, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: dotnet 6.0.16, dotnet 7.0.5 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in dotNet. A runtime DLL may be loaded from an unexpected location, resulting in remote code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-04-14 19:36:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2185493, 2185494, 2185495, 2185496, 2185497    
Bug Blocks: 2185017    

Description Pedro Sampaio 2023-04-06 14:06:59 UTC
AzureDevOps Elevation of Privilege - Dotnet CWD dll hijack vuln

Affected versions:
.NET 6.0
.NET 7.0

Affected packages:
Microsoft.NetCore.App.Runtime.* (System.Private.CoreLib)

Affected versions:
>=6.0.0, <= 6.0.15
>=7.0.0, <= 7.0.4

Patched versions:
6.0.16
7.0.5

Comment 8 Product Security DevOps Team 2023-04-14 19:36:27 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-28260