[manjaro-security] [ASA-202103-16] dotnet-runtime: multiple issues
Morten Linderud via arch-security
arch-security at lists.archlinux.org
Fri Mar 26 21:12:42 CET 2021
Arch Linux Security Advisory ASA-202103-16
==========================================
Severity: High
Date : 2021-03-25
CVE-ID : CVE-2021-1721 CVE-2021-1723 CVE-2021-24112
Package : dotnet-runtime
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1449
Summary
=======
The package dotnet-runtime before version 5.0.3.sdk103-2 is vulnerable
to multiple issues including arbitrary code execution and denial of
service.
Resolution
==========
Upgrade to 5.0.3.sdk103-2.
# pacman -Syu "dotnet-runtime>=5.0.3.sdk103-2"
The problems have been fixed upstream in version 5.0.3.sdk103.
Workaround
==========
None.
Description
===========
- CVE-2021-1721 (denial of service)
A security issue was found in dotnet-core before version 3.1.12. A
denial-of-service vulnerability exists when creating HTTPS web request
during X509 certificate chain building.
- CVE-2021-1723 (denial of service)
A flaw was found in dotnet-core before version 3.1.11. Running
callbacks outside of locks results in Krestel deadlock using HTTP2.
- CVE-2021-24112 (arbitrary code execution)
A remote code execution vulnerability exists in dotnet-core before
version 3.1.12 when parsing certain types of graphics files. This
vulnerability only exists on systems running on MacOS or Linux.
Impact
======
A malicious client can send crafted HTTP requests and crash the server,
or execute arbitrary code by reading a crafted file.
References
==========
https://bugs.archlinux.org/task/69317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1721
https://github.com/dotnet/announcements/issues/175
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1723
https://github.com/dotnet/announcements/issues/170
https://github.com/dotnet/aspnetcore/commit/20ad9fa5dcde635c13c6c83806c4701d5b7ec21e
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24112
https://github.com/dotnet/announcements/issues/176
https://security.archlinux.org/CVE-2021-1721
https://security.archlinux.org/CVE-2021-1723
https://security.archlinux.org/CVE-2021-24112
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/92c5f36f/attachment.sig>
More information about the manjaro-security
mailing list