.NET Kestrel: Denial of Service processing X509 Certificates When a .NET application is internet-facing and accepts an X509 client certificate for mutual TLS, a malicious client certificate can cause unbounded CPU usage.
Created dotnet6.0 tracking bugs for this issue: Affects: fedora-37 [bug 2214910] Affects: fedora-38 [bug 2214912] Created dotnet7.0 tracking bugs for this issue: Affects: fedora-37 [bug 2214911] Affects: fedora-38 [bug 2214913]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3581 https://access.redhat.com/errata/RHSA-2023:3581
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3582 https://access.redhat.com/errata/RHSA-2023:3582
This issue has been addressed in the following products: .NET Core on Red Hat Enterprise Linux Via RHSA-2023:3580 https://access.redhat.com/errata/RHSA-2023:3580
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3592 https://access.redhat.com/errata/RHSA-2023:3592
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3593 https://access.redhat.com/errata/RHSA-2023:3593
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-29331
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:4449 https://access.redhat.com/errata/RHSA-2023:4449
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:4448 https://access.redhat.com/errata/RHSA-2023:4448