Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/dotnet6-build@6.0.110-r0?arch=armhf&distroversion=v3.17&reponame=community
Typeapk
Namespacealpine
Namedotnet6-build
Version6.0.110-r0
Qualifiers
arch armhf
distroversion v3.17
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.0.112-r0
Latest_non_vulnerable_version6.0.114-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5fx1-z4cb-hyd8
vulnerability_id VCID-5fx1-z4cb-hyd8
summary
NuGet Elevation of Privilege Vulnerability
## Description

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0.0-rc, .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET 7.0.0-rc.1, .NET 6.0, .NET Core 3.1, and NuGet clients (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol) where a malicious actor could cause a user to execute arbitrary code.

## Affected software

### NuGet & NuGet Packages

- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.3.0 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.2.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.0.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.11.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.9.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.7.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 4.9.5 version or earlier.

### .NET SDK(s)

- Any .NET 6.0 application running on .NET 6.0.9 or earlier.
- Any .NET 3.1 application running on .NET Core 3.1.29 or earlier.

## Patches

To fix the issue, please install the latest version of .NET 6.0 or .NET Core 3.1 and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol versions). If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.

- If you're using NuGet.exe 6.3.0 or lower, you should download and install 6.3.1 from https://dist.nuget.org/win-x86-commandline/v6.3.1/nuget.exe .

- If you're using NuGet.exe 6.2.1 or lower, you should download and install 6.2.2 from https://dist.nuget.org/win-x86-commandline/v6.2.2/nuget.exe .

- If you're using NuGet.exe 6.0.2 or lower, you should download and install 6.0.3 from https://dist.nuget.org/win-x86-commandline/v6.0.3/nuget.exe .

- If you're using NuGet.exe 5.11.2 or lower, you should download and install 5.11.3 from https://dist.nuget.org/win-x86-commandline/v5.11.3/nuget.exe .

- If you're using NuGet.exe 5.9.2 or lower, you should download and install 5.9.3 from https://dist.nuget.org/win-x86-commandline/v5.9.3/nuget.exe .

- If you're using NuGet.exe 5.7.2 or lower, you should download and install 5.7.3 from https://dist.nuget.org/win-x86-commandline/v5.7.3/nuget.exe .

- If you're using NuGet.exe 4.9.5 or lower, you should download and install 4.9.6 from https://dist.nuget.org/win-x86-commandline/v4.9.6/nuget.exe .

- If you're using .NET Core 6.0, you should download and install Runtime 6.0.10 or SDK 6.0.110 (for Visual Studio 2022 v17.0) or SDK 6.0.402 (for Visual Studio 2022 v17.3) from https://dotnet.microsoft.com/download/dotnet-core/6.0.

- If you're using .NET Core 3.1, you should download and install Runtime 3.1.30 or SDK 3.1.424 (for Visual Studio 2019 v16.9 or Visual Studio 2019 v16.11 or Visual Studio 2022 v17.0 or Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/3.1.

.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.

## Other details

Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/65

MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41032
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41032.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41032
reference_id
reference_type
scores
0
value 0.18296
scoring_system epss
scoring_elements 0.95224
published_at 2026-04-18T12:55:00Z
1
value 0.18296
scoring_system epss
scoring_elements 0.9522
published_at 2026-04-16T12:55:00Z
2
value 0.18296
scoring_system epss
scoring_elements 0.95212
published_at 2026-04-13T12:55:00Z
3
value 0.18296
scoring_system epss
scoring_elements 0.95209
published_at 2026-04-12T12:55:00Z
4
value 0.18296
scoring_system epss
scoring_elements 0.95203
published_at 2026-04-09T12:55:00Z
5
value 0.18296
scoring_system epss
scoring_elements 0.95199
published_at 2026-04-08T12:55:00Z
6
value 0.18296
scoring_system epss
scoring_elements 0.95192
published_at 2026-04-07T12:55:00Z
7
value 0.18296
scoring_system epss
scoring_elements 0.95188
published_at 2026-04-04T12:55:00Z
8
value 0.18296
scoring_system epss
scoring_elements 0.95187
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41032
2
reference_url https://github.com/NuGet/Announcements/issues/65
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/Announcements/issues/65
3
reference_url https://github.com/NuGet/NuGet.Client
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client
4
reference_url https://github.com/NuGet/NuGet.Client/commit/6392863cf83f4870e18f1d02f2463cca633e59ed
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/commit/6392863cf83f4870e18f1d02f2463cca633e59ed
5
reference_url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
12
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-28T20:23:59Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-41032
14
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032
15
reference_url https://www.edwardthomson.com/blog/my-first-cve.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.edwardthomson.com/blog/my-first-cve.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2132614
reference_id 2132614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2132614
17
reference_url https://github.com/advisories/GHSA-g3q9-xf95-8hp5
reference_id GHSA-g3q9-xf95-8hp5
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g3q9-xf95-8hp5
18
reference_url https://access.redhat.com/errata/RHSA-2022:6911
reference_id RHSA-2022:6911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6911
19
reference_url https://access.redhat.com/errata/RHSA-2022:6912
reference_id RHSA-2022:6912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6912
20
reference_url https://access.redhat.com/errata/RHSA-2022:6913
reference_id RHSA-2022:6913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6913
21
reference_url https://access.redhat.com/errata/RHSA-2022:6914
reference_id RHSA-2022:6914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6914
22
reference_url https://access.redhat.com/errata/RHSA-2022:6915
reference_id RHSA-2022:6915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6915
23
reference_url https://access.redhat.com/errata/RHSA-2022:7826
reference_id RHSA-2022:7826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7826
24
reference_url https://access.redhat.com/errata/RHSA-2022:8434
reference_id RHSA-2022:8434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8434
25
reference_url https://usn.ubuntu.com/5670-1/
reference_id USN-5670-1
reference_type
scores
url https://usn.ubuntu.com/5670-1/
fixed_packages
0
url pkg:apk/alpine/dotnet6-build@6.0.110-r0?arch=armhf&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/dotnet6-build@6.0.110-r0?arch=armhf&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet6-build@6.0.110-r0%3Farch=armhf&distroversion=v3.17&reponame=community
aliases CVE-2022-41032, GHSA-g3q9-xf95-8hp5
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fx1-z4cb-hyd8
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet6-build@6.0.110-r0%3Farch=armhf&distroversion=v3.17&reponame=community