[USN-7058-1] .NET vulnerabilities
[USN-7057-2] WEBrick vulnerability
[USN-7014-2] nginx vulnerability
[USN-7058-1] .NET vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7058-1
October 08, 2024
dotnet6, dotnet8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in dotnet6, dotnet8.
Software Description:
- dotnet8: .NET CLI tools and runtime
- dotnet6: .NET CLI tools and runtime
Details:
Brennan Conroy discovered that the .NET Kestrel web server did not
properly handle closing HTTP/3 streams under certain circumstances. An
attacker could possibly use this issue to achieve remote code execution.
This vulnerability only impacted Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
(CVE-2024-38229)
It was discovered that .NET components designed to process malicious input
were susceptible to hash flooding attacks. An attacker could possibly use
this issue to cause a denial of service, resulting in a crash.
(CVE-2024-43483)
It was discovered that the .NET System.IO.Packaging namespace did not
properly process SortedList data structures. An attacker could possibly
use this issue to cause a denial of service, resulting in a crash.
(CVE-2024-43484)
It was discovered that .NET did not properly handle the deserialization of
of certain JSON properties. An attacker could possibly use this issue to
cause a denial of service, resulting in a crash. (CVE-2024-43485)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
aspnetcore-runtime-8.0 8.0.10-0ubuntu1~24.04.1
dotnet-host-8.0 8.0.10-0ubuntu1~24.04.1
dotnet-hostfxr-8.0 8.0.10-0ubuntu1~24.04.1
dotnet-runtime-8.0 8.0.10-0ubuntu1~24.04.1
dotnet-sdk-8.0 8.0.110-0ubuntu1~24.04.1
dotnet8 8.0.110-8.0.10-0ubuntu1~24.04.1
Ubuntu 22.04 LTS
aspnetcore-runtime-6.0 6.0.135-0ubuntu1~22.04.1
aspnetcore-runtime-8.0 8.0.10-0ubuntu1~22.04.1
dotnet-host 6.0.135-0ubuntu1~22.04.1
dotnet-host-8.0 8.0.10-0ubuntu1~22.04.1
dotnet-hostfxr-6.0 6.0.135-0ubuntu1~22.04.1
dotnet-hostfxr-8.0 8.0.10-0ubuntu1~22.04.1
dotnet-runtime-6.0 6.0.135-0ubuntu1~22.04.1
dotnet-runtime-8.0 8.0.10-0ubuntu1~22.04.1
dotnet-sdk-6.0 6.0.135-0ubuntu1~22.04.1
dotnet-sdk-8.0 8.0.110-0ubuntu1~22.04.1
dotnet6 6.0.135-0ubuntu1~22.04.1
dotnet8 8.0.110-8.0.10-0ubuntu1~22.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7058-1
CVE-2024-38229, CVE-2024-43483, CVE-2024-43484, CVE-2024-43485
Package Information:
https://launchpad.net/ubuntu/+source/dotnet8/8.0.110-8.0.10-0ubuntu1~24.04.1
https://launchpad.net/ubuntu/+source/dotnet6/6.0.135-0ubuntu1~22.04.1
https://launchpad.net/ubuntu/+source/dotnet8/8.0.110-8.0.10-0ubuntu1~22.04.1
[USN-7057-2] WEBrick vulnerability
==========================================================================
Ubuntu Security Notice USN-7057-2
October 08, 2024
ruby-webrick vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
WEBrick could allow a HTTP request smuggling attack.
Software Description:
- ruby-webrick: HTTP server toolkit in Ruby
Details:
USN-7057-1 fixed a vulnerability in WEBrick. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that WEBrick incorrectly handled having both a Content-
Length header and a Transfer-Encoding header. A remote attacker could
possibly use this issue to perform a HTTP request smuggling attack.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
ruby-webrick 1.7.0-3ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7057-2
https://ubuntu.com/security/notices/USN-7057-1
CVE-2024-47220
Package Information:
https://launchpad.net/ubuntu/+source/ruby-webrick/1.7.0-3ubuntu0.1
[USN-7014-2] nginx vulnerability
==========================================================================
Ubuntu Security Notice USN-7014-2
October 08, 2024
nginx vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
nginx could be made to crash if it received specially crafted network
traffic.
Software Description:
- nginx: small, powerful, scalable web/proxy server
Details:
USN-7014-1 fixed a vulnerability in nginx. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that the nginx ngx_http_mp4 module incorrectly handled
certain malformed mp4 files. In environments where the mp4 directive is in
use, a remote attacker could possibly use this issue to cause nginx to
crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
nginx 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
nginx-common 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
nginx-core 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
nginx-extras 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
nginx-full 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
nginx-light 1.14.0-0ubuntu1.11+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
nginx 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
nginx-common 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
nginx-core 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
nginx-extras 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
nginx-full 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
nginx-light 1.10.3-0ubuntu0.16.04.5+esm6
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7014-2
https://ubuntu.com/security/notices/USN-7014-1
CVE-2024-7347