{"id":"USN-7058-1","summary":"dotnet6, dotnet8 vulnerabilities","details":"Brennan Conroy discovered that the .NET Kestrel web server did not\nproperly handle closing HTTP/3 streams under certain circumstances. An\nattacker could possibly use this issue to achieve remote code execution.\nThis vulnerability only impacted .NET8. (CVE-2024-38229)\n\nIt was discovered that .NET components designed to process malicious input\nwere susceptible to hash flooding attacks. An attacker could possibly use\nthis issue to cause a denial of service, resulting in a crash.\n(CVE-2024-43483)\n\nIt was discovered that the .NET System.IO.Packaging namespace did not\nproperly process SortedList data structures. An attacker could possibly\nuse this issue to cause a denial of service, resulting in a crash.\n(CVE-2024-43484)\n\nIt was discovered that .NET did not properly handle the deserialization of\nof certain JSON properties. An attacker could possibly use this issue to\ncause a denial of service, resulting in a crash. (CVE-2024-43485)\n","modified":"2026-02-10T04:45:28Z","published":"2024-10-08T19:17:19Z","related":["UBUNTU-CVE-2024-38229","UBUNTU-CVE-2024-43483","UBUNTU-CVE-2024-43484","UBUNTU-CVE-2024-43485"],"upstream":["CVE-2024-38229","CVE-2024-43483","CVE-2024-43484","CVE-2024-43485","UBUNTU-CVE-2024-38229","UBUNTU-CVE-2024-43483","UBUNTU-CVE-2024-43484","UBUNTU-CVE-2024-43485"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7058-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38229"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43483"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43484"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43485"}],"affected":[{"package":{"name":"dotnet6","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/dotnet6@6.0.135-0ubuntu1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0.135-0ubuntu1~22.04.1"}]}],"versions":["6.0.108-0ubuntu1~22.04.1","6.0.109-0ubuntu1~22.04.1","6.0.110-0ubuntu1~22.04.1","6.0.111-0ubuntu1~22.04.1","6.0.113-0ubuntu1~22.04.1","6.0.116-0ubuntu1~22.04.1","6.0.118-0ubuntu1~22.04.1","6.0.119-0ubuntu1~22.04.1","6.0.120-0ubuntu1~22.04.1","6.0.121-0ubuntu1~22.04.1","6.0.122-0ubuntu1~22.04.1","6.0.123-0ubuntu1~22.04.1","6.0.124-0ubuntu1~22.04.1","6.0.125-0ubuntu1~22.04.1","6.0.126-0ubuntu1~22.04.1","6.0.127-0ubuntu1~22.04.1","6.0.128-0ubuntu1~22.04.2","6.0.132-0ubuntu1~22.04.1","6.0.133-0ubuntu1~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"aspnetcore-runtime-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"aspnetcore-targeting-pack-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-apphost-pack-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-host"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-hostfxr-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-runtime-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-6.0-source-built-artifacts"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-targeting-pack-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet-templates-6.0"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"dotnet6"},{"binary_version":"6.0.135-0ubuntu1~22.04.1","binary_name":"netstandard-targeting-pack-2.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7058-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38229"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43483"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43484"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43485"}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"dotnet8","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/dotnet8@8.0.110-8.0.10-0ubuntu1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.110-8.0.10-0ubuntu1~22.04.1"}]}],"versions":["8.0.102-8.0.2-0ubuntu1~22.04.1","8.0.103-8.0.3-0ubuntu1~22.04.1","8.0.103-8.0.3-0ubuntu1~22.04.2","8.0.105-8.0.5-0ubuntu1~22.04.1","8.0.107-8.0.7-0ubuntu1~22.04.1","8.0.108-8.0.8-0ubuntu1~22.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"aspnetcore-runtime-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"aspnetcore-runtime-dbg-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"aspnetcore-targeting-pack-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-apphost-pack-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-host-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-hostfxr-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-runtime-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-runtime-dbg-8.0"},{"binary_version":"8.0.110-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-8.0"},{"binary_version":"8.0.110-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-8.0-source-built-artifacts"},{"binary_version":"8.0.110-0ubuntu1~22.04.1","binary_name":"dotnet-sdk-dbg-8.0"},{"binary_version":"8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet-targeting-pack-8.0"},{"binary_version":"8.0.110-0ubuntu1~22.04.1","binary_name":"dotnet-templates-8.0"},{"binary_version":"8.0.110-8.0.10-0ubuntu1~22.04.1","binary_name":"dotnet8"},{"binary_version":"8.0.110-0ubuntu1~22.04.1","binary_name":"netstandard-targeting-pack-2.1-8.0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7058-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38229"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43483"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43484"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43485"}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"dotnet8","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/dotnet8@8.0.110-8.0.10-0ubuntu1~24.04.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.110-8.0.10-0ubuntu1~24.04.1"}]}],"versions":["8.0.100-8.0.0~rc1-0ubuntu1","8.0.100-8.0.0~rc2-0ubuntu1","8.0.100-8.0.0~rc2-0ubuntu2","8.0.100-8.0.0-0ubuntu1","8.0.100-8.0.0-0ubuntu2","8.0.101-8.0.1-0ubuntu1","8.0.101-8.0.1-0ubuntu2","8.0.102-8.0.2-0ubuntu1","8.0.103-8.0.3-0ubuntu2","8.0.103-8.0.3-0ubuntu3","8.0.104-8.0.4-0ubuntu1","8.0.105-8.0.5-0ubuntu1~24.04.1","8.0.107-8.0.7-0ubuntu1~24.04.1","8.0.108-8.0.8-0ubuntu1~24.04.1","8.0.108-8.0.8-0ubuntu1~24.04.2"],"ecosystem_specific":{"binaries":[{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"aspnetcore-runtime-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"aspnetcore-runtime-dbg-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"aspnetcore-targeting-pack-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-apphost-pack-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-host-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-hostfxr-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-runtime-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-runtime-dbg-8.0"},{"binary_version":"8.0.110-0ubuntu1~24.04.1","binary_name":"dotnet-sdk-8.0"},{"binary_version":"8.0.110-0ubuntu1~24.04.1","binary_name":"dotnet-sdk-8.0-source-built-artifacts"},{"binary_version":"8.0.110-0ubuntu1~24.04.1","binary_name":"dotnet-sdk-dbg-8.0"},{"binary_version":"8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet-targeting-pack-8.0"},{"binary_version":"8.0.110-0ubuntu1~24.04.1","binary_name":"dotnet-templates-8.0"},{"binary_version":"8.0.110-8.0.10-0ubuntu1~24.04.1","binary_name":"dotnet8"},{"binary_version":"8.0.110-0ubuntu1~24.04.1","binary_name":"netstandard-targeting-pack-2.1-8.0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7058-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-38229"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43483"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43484"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-43485"}],"ecosystem":"Ubuntu:24.04:LTS"}}}],"schema_version":"1.7.3"}