{"id":"USN-6161-1","summary":"dotnet6, dotnet7 vulnerabilities","details":"It was discovered that .NET did not properly enforce certain\nrestrictions when deserializing a DataSet or DataTable from\nXML. An attacker could possibly use this issue to elevate their\nprivileges. (CVE-2023-24936)\n\nKevin Jones discovered that .NET did not properly handle the\nAIA fetching process for X.509 client certificates. An attacker\ncould possibly use this issue to cause a denial of service.\n(CVE-2023-29331)\n\nKalle Niemitalo discovered that the .NET package manager,\nNuGet, was susceptible to a potential race condition. An\nattacker could possibly use this issue to perform remote\ncode execution. (CVE-2023-29337)\n\nTom Deseyn discovered that .NET did not properly process certain\narguments when extracting the contents of a tar file. An attacker\ncould possibly use this issue to elevate their privileges. This\nissue only affected the dotnet7 package. (CVE-2023-32032)\n\nIt was discovered that .NET did not properly handle memory in\ncertain circumstances. An attacker could possibly use this issue\nto cause a denial of service or perform remote code execution.\n(CVE-2023-33128)\n","modified":"2026-02-10T04:43:09Z","published":"2023-06-13T20:33:22Z","related":["UBUNTU-CVE-2023-24936","UBUNTU-CVE-2023-29331","UBUNTU-CVE-2023-29337","UBUNTU-CVE-2023-32032","UBUNTU-CVE-2023-33128"],"upstream":["CVE-2023-24936","CVE-2023-29331","CVE-2023-29337","CVE-2023-32032","CVE-2023-33128","UBUNTU-CVE-2023-24936","UBUNTU-CVE-2023-29331","UBUNTU-CVE-2023-29337","UBUNTU-CVE-2023-32032","UBUNTU-CVE-2023-33128"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6161-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-24936"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29331"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29337"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32032"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-33128"}],"affected":[{"package":{"name":"dotnet6","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/dotnet6@6.0.118-0ubuntu1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0.118-0ubuntu1~22.04.1"}]}],"versions":["6.0.108-0ubuntu1~22.04.1","6.0.109-0ubuntu1~22.04.1","6.0.110-0ubuntu1~22.04.1","6.0.111-0ubuntu1~22.04.1","6.0.113-0ubuntu1~22.04.1","6.0.116-0ubuntu1~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"aspnetcore-runtime-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"aspnetcore-targeting-pack-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-apphost-pack-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-host"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-hostfxr-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-runtime-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-6.0-source-built-artifacts"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-targeting-pack-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet-templates-6.0"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"dotnet6"},{"binary_version":"6.0.118-0ubuntu1~22.04.1","binary_name":"netstandard-targeting-pack-2.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6161-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-24936"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29331"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29337"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32032"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-33128"}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"dotnet7","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/dotnet7@7.0.107-0ubuntu1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.107-0ubuntu1~22.04.1"}]}],"versions":["7.0.105-0ubuntu1~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"aspnetcore-runtime-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"aspnetcore-targeting-pack-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-apphost-pack-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-host-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-hostfxr-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-runtime-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-7.0-source-built-artifacts"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-targeting-pack-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet-templates-7.0"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"dotnet7"},{"binary_version":"7.0.107-0ubuntu1~22.04.1","binary_name":"netstandard-targeting-pack-2.1-7.0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6161-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-24936"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29331"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29337"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32032"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-33128"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}