CVE-2023-33127 - The Windows .NET runtime exposes an IPC diagnostic endpoint named pipe for collecting diagnostic information and debugging. DCOM applications that expose a diagnostic port can be abused to achieve cross-session elevation of privilege (EoP) and code execution by taking control of the diagnostic port. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127
The CVE is public now: https://github.com/dotnet/core/blob/7cc69f36461a2aefe4c29acb46d6816cd741a8a3/release-notes/7.0/7.0.9/7.0.9.md#notable-changes
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-33127
References: https://devblogs.microsoft.com/dotnet/july-2023-updates/ https://github.com/dotnet/announcements/issues/263 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127