USN-6278-1: .NET vulnerabilities
8 August 2023
Several security issues were fixed in .NET.
Releases
Packages
Details
It was discovered that .NET did not properly handle the execution
of certain commands. An attacker could possibly use this issue to
achieve remote code execution. (CVE-2023-35390)
Benoit Foucher discovered that .NET did not properly implement the
QUIC stream limit in HTTP/3. An attacker could possibly use this
issue to cause a denial of service. (CVE-2023-38178)
It was discovered that .NET did not properly handle the disconnection
of potentially malicious clients interfacing with a Kestrel server. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-38180)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
-
aspnetcore-runtime-6.0
-
6.0.121-0ubuntu1~23.04.1
-
aspnetcore-runtime-7.0
-
7.0.110-0ubuntu1~23.04.1
-
dotnet-host
-
6.0.121-0ubuntu1~23.04.1
-
dotnet-host-7.0
-
7.0.110-0ubuntu1~23.04.1
-
dotnet-hostfxr-6.0
-
6.0.121-0ubuntu1~23.04.1
-
dotnet-hostfxr-7.0
-
7.0.110-0ubuntu1~23.04.1
-
dotnet-runtime-6.0
-
6.0.121-0ubuntu1~23.04.1
-
dotnet-runtime-7.0
-
7.0.110-0ubuntu1~23.04.1
-
dotnet-sdk-6.0
-
6.0.121-0ubuntu1~23.04.1
-
dotnet-sdk-7.0
-
7.0.110-0ubuntu1~23.04.1
-
dotnet6
-
6.0.121-0ubuntu1~23.04.1
-
dotnet7
-
7.0.110-0ubuntu1~23.04.1
In general, a standard system update will make all the necessary changes.