Microsoft Launches .NET Versions 9.0.3 and 8.0.14 Addressing One CVE Vulnerability 

Microsoft Launches .NET Versions 9.0.3 and 8.0.14 Addressing One CVE Vulnerability 

Microsoft has recently introduced updates for both. NET 9 and. NET 8, although the changes are relatively minor. A significant highlight of these releases is the patch for the security vulnerability identified as CVE-2025-24070. Addressing this issue is crucial as it permitted attackers to elevate their privileges, potentially granting them unauthorized access to systems.

Release Notes Overview

The release notes for these updates are identical. Here’s a summary of the modifications that have been made:

  • Update 8.0.13.md
  • Resolved linting warnings in markdown files
  • Modified CODEOWNERS file
  • Updated URLs to builds.dotnet.microsoft.com
  • Revised domain in releases.json
  • .NET 10 Preview 1 – Release Notes included
  • Updated README.md documentation
  • Revised 10.0 README.md for clarity
  • Adjusted support files
  • Fixed various links
  • Updated README.md to enhance information
  • Corrected broken links in. NET 10 preview 1 Release Notes
  • Clarified that. NET 10 is not “Unknown”
  • Provided update on release date
  • Added Ubuntu Chiseled tags to container release notes for. NET 10 Preview 1
  • Revised wpf.md documentation
  • Compiled API differences between. NET 10 Preview 1 and Preview 2
  • Included known issues for Microsoft. AspNetCore. Components. CustomElements version 9.0.3
  • Artifacts for the. NET 3B 2025 Servicing Release have been updated
  • Revised releases-index.json file

How to Get Started

For those looking to utilize these latest versions, Microsoft Devblogs is the go-to resource. Here, you can access installers, binaries, container images, Linux binaries, and find detailed information on known issues. Visit the following link to explore all available resources: Microsoft Devblogs.

For further information, see the source details: Microsoft.

Source & Images

Leave a Reply

Your email address will not be published. Required fields are marked *