{"id":46120,"date":"2023-06-13T10:00:00","date_gmt":"2023-06-13T17:00:00","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/dotnet\/?p=46120"},"modified":"2024-12-13T14:12:33","modified_gmt":"2024-12-13T22:12:33","slug":"june-2023-updates","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/dotnet\/june-2023-updates\/","title":{"rendered":".NET June 2023 Updates \u2013 .NET 7.0.8, .NET 6.0.19"},"content":{"rendered":"<h2>Update &#8212; June 22, 2023<\/h2>\n<p>We have released a second update this month to address a regression in our earlier release (June 13th). The new versions are .NET 6.0.19 and .NET 7.0.8. The regression is functional and doesn&#8217;t require action on your part unless you are affected by the issue.<\/p>\n<h3>Regression<\/h3>\n<p>The NET 6.0.18 and 7.0.7 updates update added constraints to PFX certificate loading to fix a DoS vulnerability (CVE-2023-29331). We created a specific exception message with a link to a known issue KB https:\/\/support.microsoft.com\/kb\/5025823 to describe these behavioral changes.<\/p>\n<p>We learned from customer reports during the week of June 13, 2023 that .NET 6.0.18 and 7.0.7 may fail to import PKCS12 blobs whose private keys are protected by a null password. Callers may non-deterministically observe a <code>CryptographicException<\/code> being thrown by the <code>X509Certificate<\/code> constructor on those runtimes. This regression was unintentional and a fix is being offered for affected applications.<\/p>\n<p>Also documented at <a href=\"https:\/\/support.microsoft.com\/kb\/5028608\">.NET June OOB Updates<\/a>.<\/p>\n<h3>Download Update<\/h3>\n<p>You can download <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/7.0\">7.0.8<\/a> and <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/6.0\">6.0.19<\/a> versions for Windows, macOS, and Linux, for x86, x64, Arm32, and Arm64.<\/p>\n<ul>\n<li>Installers and binaries: <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/7.0\">7.0.8<\/a> | <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/6.0\">6.0.19<\/a><\/li>\n<li>Release notes: <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/7.0.8\/7.0.8.md\">7.0.8<\/a> | <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/6.0.19\/6.0.19.md\">6.0.19<\/a> |<\/li>\n<li><a href=\"https:\/\/mcr.microsoft.com\/catalog?search=dotnet\/\">Container images<\/a><\/li>\n<li>Linux packages: <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/install-linux.md\">7.0.8<\/a> | <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/install-linux.md\">6.0.19<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/dotnet\/core\/issues\/8570\">Release feedback\/issue<\/a><\/li>\n<\/ul>\n<h3>Do I need to install 6.0.19 \/ 7.0.8?<\/h3>\n<p>There is no need to install these updates unless you are affected by the functional regression listed at <a href=\"https:\/\/support.microsoft.com\/kb\/5028608\">KB5028608<\/a>. If you are not affected by the functional regression described above, you can safely remain on 6.0.18 \/ 7.0.7.<\/p>\n<h3>Is 6.0.19 \/ 7.0.8 a security update?<\/h3>\n<p>No. These updates contain no new security fixes beyond what already shipped in 6.0.18 \/ 7.0.7. As long as you are running at least 6.0.18 or 7.0.7, you are protected with all of the latest available security fixes.<\/p>\n<hr \/>\n<p>Today, we are releasing the <a href=\"https:\/\/github.com\/dotnet\/announcements\/issues\/251\">.NET June 2023 Updates<\/a>. These updates contain security and non-security improvements. <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/cve.md\">Your app may be vulnerable<\/a> if you have not deployed a recent .NET update.<\/p>\n<p>You can download <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/7.0\">7.0.7<\/a> and <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/6.0\">6.0.18<\/a> versions for Windows, macOS, and Linux, for x86, x64, Arm32, and Arm64.<\/p>\n<ul>\n<li>Installers and binaries: <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/7.0\">7.0.7<\/a> | <a href=\"https:\/\/dotnet.microsoft.com\/download\/dotnet\/6.0\">6.0.18<\/a><\/li>\n<li>Release notes: <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/7.0.7\/7.0.7.md\">7.0.7<\/a> | <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/6.0.18\/6.0.18.md\">6.0.18<\/a> |<\/li>\n<li><a href=\"https:\/\/mcr.microsoft.com\/catalog?search=dotnet\/\">Container images<\/a><\/li>\n<li>Linux packages: <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/install-linux.md\">7.0.7<\/a> | <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/install-linux.md\">6.0.18<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/dotnet\/core\/issues\/8539\">Release feedback\/issue<\/a><\/li>\n<li>Known issues: <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/known-issues.md\">7.0<\/a> | <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/known-issues.md\">6.0<\/a><\/li>\n<\/ul>\n<h3>Windows Package Manager CLI (winget)<\/h3>\n<p>You can now install .NET updates using the Windows Package Manager CLI (winget):<\/p>\n<ul>\n<li>To install the .NET 7 runtime: <code>winget install dotnet-runtime-7<\/code><\/li>\n<li>To install the .NET 7 SDK: <code>winget install dotnet-sdk-7<\/code><\/li>\n<li>To update an existing installation: <code>winget upgrade<\/code><\/li>\n<\/ul>\n<p>See <a href=\"https:\/\/learn.microsoft.com\/dotnet\/core\/install\/windows?tabs=net70#install-with-windows-package-manager-winget\">Install with Windows Package Manager (winget)<\/a> for more information.<\/p>\n<h2>Improvements<\/h2>\n<ul>\n<li>ASP.NET Core: <a href=\"https:\/\/github.com\/dotnet\/aspnetcore\/issues?q=milestone%3A7.0.7+is%3Aclosed+label%3Aservicing-approved+\">7.0.7<\/a> | <a href=\"https:\/\/github.com\/dotnet\/aspnetcore\/issues?q=milestone%3A6.0.18+is%3Aclosed+label%3Aservicing-approved+\">6.0.18<\/a><\/li>\n<li>Entity Framework Core: <a href=\"https:\/\/github.com\/dotnet\/efcore\/issues?q=milestone%3A7.0.7+is%3Aclosed+label%3Aservicing-approved+\">7.0.7<\/a><\/li>\n<li>Runtime: <a href=\"https:\/\/github.com\/dotnet\/runtime\/issues?q=milestone%3A7.0.7+is%3Aclosed+label%3Aservicing-approved+\">7.0.7<\/a> | <a href=\"https:\/\/github.com\/dotnet\/runtime\/issues?q=milestone%3A6.0.18+is%3Aclosed+label%3Aservicing-approved+\">6.0.18<\/a><\/li>\n<li>Winforms: <a href=\"https:\/\/github.com\/dotnet\/winforms\/issues?q=milestone%3A7.0.7+is%3Aclosed+label%3Aservicing-approved+\">7.0.7<\/a> | <a href=\"https:\/\/github.com\/dotnet\/winforms\/issues?q=milestone%3A6.0.18+is%3Aclosed+label%3Aservicing-approved+\">6.0.18<\/a><\/li>\n<\/ul>\n<h2>Security<\/h2>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24895\">CVE-2023-24895 &#8211; .NET Remote Code Execution Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in how WPF for .NET handles certain XAML Frame elements which may result in remote code execution.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24897\">CVE-2023-24897 &#8211; .NET Remote Code Execution Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in how .NET reads debugging symbols, where reading a malicious symbols file may result in remote code execution.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24936\">CVE-2023-24936 &#8211; .NET Elevation of Privilege Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in .NET when deserializing a DataSet or DataTable from XML which may result in elevation of privileges.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29331\">CVE-2023-29331 &#8211; .NET Denial of Service Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in .NET when processing X.509 certificates that may result in Denial of Service.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29337\">CVE-2023-29337 &#8211; NuGet Client Remote Code Execution Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET and NuGet on Linux. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in nuget where a potential race condition that can lead to a symlink attack<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32032\">CVE-2023-32032 &#8211; .NET Denial of Service Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in .NET using extracting the contents of a Tar file which may result in elevation of privileges.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33126\">CVE-2023-33126 &#8211; .NET Denial of Service Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in .NET during crash and stack trace scenarios that could lead to loading arbitrary binaries.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33128\">CVE-2023-33128 &#8211; .NET Denial of Service Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in .NET source generator for P\/Invokes that can lead to generated code freeing uninitialized memory and crashing.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33135\">CVE-2023-33135 &#8211; .NET Denial of Service Vulnerability<\/a><\/p>\n<p>Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.<\/p>\n<p>A vulnerability exists in the .NET SDK during tool restore which can lead to an elevation of privilege.<\/p>\n<h2>Visual Studio<\/h2>\n<p>See release notes for Visual Studio compatibility for <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/7.0\/7.0.7\/7.0.7.md#visual-studio-compatibility\">.NET 7.0<\/a> and <a href=\"https:\/\/github.com\/dotnet\/core\/blob\/main\/release-notes\/6.0\/6.0.18\/6.0.18.md#visual-studio-compatibility\">.NET 6.0<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out latest June 2023 updates for .NET 7.0 and .NET 6.0<\/p>\n","protected":false},"author":7455,"featured_media":46266,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[685,7600],"tags":[],"class_list":["post-46120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dotnet","category-maintenance-and-updates"],"acf":[],"blog_post_summary":"<p>Check out latest June 2023 updates for .NET 7.0 and .NET 6.0<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/46120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/users\/7455"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/comments?post=46120"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/46120\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media\/46266"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media?parent=46120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/categories?post=46120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/tags?post=46120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}