[manjaro-security] [ASA-202103-16] dotnet-runtime: multiple issues

Morten Linderud via arch-security arch-security at lists.archlinux.org
Fri Mar 26 21:12:42 CET 2021


Arch Linux Security Advisory ASA-202103-16
==========================================

Severity: High
Date    : 2021-03-25
CVE-ID  : CVE-2021-1721 CVE-2021-1723 CVE-2021-24112
Package : dotnet-runtime
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1449

Summary
=======

The package dotnet-runtime before version 5.0.3.sdk103-2 is vulnerable
to multiple issues including arbitrary code execution and denial of
service.

Resolution
==========

Upgrade to 5.0.3.sdk103-2.

# pacman -Syu "dotnet-runtime>=5.0.3.sdk103-2"

The problems have been fixed upstream in version 5.0.3.sdk103.

Workaround
==========

None.

Description
===========

- CVE-2021-1721 (denial of service)

A security issue was found in dotnet-core before version 3.1.12. A
denial-of-service vulnerability exists when creating HTTPS web request
during X509 certificate chain building.

- CVE-2021-1723 (denial of service)

A flaw was found in dotnet-core before version 3.1.11. Running
callbacks outside of locks results in Krestel deadlock using HTTP2.

- CVE-2021-24112 (arbitrary code execution)

A remote code execution vulnerability exists in dotnet-core before
version 3.1.12 when parsing certain types of graphics files. This
vulnerability only exists on systems running on MacOS or Linux.

Impact
======

A malicious client can send crafted HTTP requests and crash the server,
or execute arbitrary code by reading a crafted file.

References
==========

https://bugs.archlinux.org/task/69317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1721
https://github.com/dotnet/announcements/issues/175
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1723
https://github.com/dotnet/announcements/issues/170
https://github.com/dotnet/aspnetcore/commit/20ad9fa5dcde635c13c6c83806c4701d5b7ec21e
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24112
https://github.com/dotnet/announcements/issues/176
https://security.archlinux.org/CVE-2021-1721
https://security.archlinux.org/CVE-2021-1723
https://security.archlinux.org/CVE-2021-24112
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/92c5f36f/attachment.sig>


More information about the manjaro-security mailing list