Package "dotnet8"
Name: |
dotnet8
|
Description: |
.NET CLI tools and runtime
|
Latest version: |
8.0.117-8.0.17-0ubuntu1~24.04.1 |
Release: |
noble (24.04) |
Level: |
security |
Repository: |
main |
Homepage: |
https://dot.net |
Links
Download "dotnet8"
Other versions of "dotnet8" in Noble
Packages in group
Deleted packages are displayed in grey.
Changelog
dotnet8 (8.0.117-8.0.17-0ubuntu1~24.04.1) noble; urgency=medium
* New upstream release
* SECURITY UPDATE: remote code execution
- CVE-2025-30399: DLL Hijacking Remote Code Execution Vulnerability.
When using the Download File task in Microsoft.NETCore.App.Runtime,
omitting the DestinationFileName in the task invocation may expose
users to remote file hijacking if the server is malicious.
-- Dominik Viererbe <email address hidden> Mon, 09 Jun 2025 12:16:30 +0300
|
Source diff to previous version |
dotnet8 (8.0.116-8.0.16-0ubuntu1~24.04.1) noble; urgency=medium
* New upstream release
* SECURITY UPDATE: spoofing vulnerability
- CVE-2025-26646: .NET and Visual Studio Spoofing Vulnerability
* Remove strict bootstrapping artifact RID matching. Strict matching caused
issues during bootstrapping of .NET for a new Ubuntu series, because it
was build with the binary artifact of the previous series, which caused
the RIDs not to match. (LP: #2110033) Affected files:
- debian/rules
- debian/eng/source_build_artifact_path.py
- debian/tests/build-time-tests/tests.py
-- Dominik Viererbe <email address hidden> Tue, 06 May 2025 13:59:06 +0300
|
Source diff to previous version |
2110033 |
Disable strict bootstrapping artifact RID matching |
|
dotnet8 (8.0.115-8.0.15-0ubuntu1~24.04.1) noble; urgency=medium
* New upstream release
* SECURITY UPDATE: denial of service
- CVE-2025-26682: DoS - ASP.NET Core denial of service with HTTP/3
-- Dominik Viererbe <email address hidden> Fri, 04 Apr 2025 12:32:57 +0300
|
Source diff to previous version |
CVE-2025-26682 |
Allocation of resources without limits or throttling in ASP.NET Core a ... |
|
dotnet8 (8.0.114-8.0.14-0ubuntu1~24.04.1) noble; urgency=medium
* New upstream release (LP: #2101028)
* SECURITY UPDATE: elevation of privilege
- CVE-2025-24070: EoP - Potential Security Risk in
SignInManager.RefreshSignInAsync Method
* debian/control:
- moved Suggests dotnet-runtime-dbg-8.0 from dotnet8 to dotnet-runtime-8.0
- moved Suggests aspnetcore-runtime-dbg-8.0 from dotnet8 to aspnetcore-runtime-8.0
- moved Suggests dotnet-sdk-dbg-8.0 from dotnet8 to dotnet-sdk-8.0
-- Dominik Viererbe <email address hidden> Thu, 06 Mar 2025 11:24:30 +0200
|
Source diff to previous version |
2101028 |
New upstream microrelease 8.0.114 / 8.0.14 |
CVE-2025-24070 |
Weak authentication in ASP.NET Core & Visual Studio allows an unau ... |
|
dotnet8 (8.0.112-8.0.12-0ubuntu1~24.04.1) noble; urgency=medium
* New upstream release (LP: #2094272).
* SECURITY UPDATE: remote code execution
- CVE-2025-21172: An integer overflow in msdia140.dll leads to heap-based
buffer overflow, leading to possible RCE. An attacker could exploit this
vulnerability by loading a specially crafted file in Visual Studio.
* SECURITY UPDATE: remote code execution
- CVE-2025-21176: Insufficient input data validation leads to heap-based
buffer overflow in msdia140.dll. An attacker could exploit this
vulnerability by loading a specially crafted file in Visual Studio.
* SECURITY UPDATE: elevation of privilege
- CVE-2025-21173: Insecure Temp File Usage Allows Malicious Package
Dependency Injection on Linux. An attacker could exploit this
vulnerability to writing a specially crafted file in the security
context of the local system. This only affects .NET on Linux operating
systems.
* Unified source build transition. The debian source tree for dotnet*
source packages is now build from a common source (see also:
https://github.com/canonical/dotnet-source-build/pull/13). Changes include:
- d/rules: Refactored; the same file is now used by
all dotnet* source packages. A major change is the use of substvars.
- d/control: Change hard-coded libicu* to dynamic ${libicu:Depends} substvar.
- d/eng/dotnet-pkg-info.mk: Added to provide common information and
functionality for all dotnet* source packages. Is used by d/rules.
- Removed .in file extension from the files
d/*.{install,manpages,dirs,docs,preinst,sh}.in and used substvars.
- d/eng/build-dotnet-tarball.sh: Removed.
- d/eng/source_build_artifact_path.py, d/eng/versionlib,
d/tests/regular-tests: Updated; includes bug-fixes from
other dotnet* source packages.
- d/patches: Renamed patch files to uniquely identify patches among all
dotnet* source packages.
* d/aspnetcore-runtime-8.0.docs: Included src/razor/NOTICE.txt in package to
comply with Apache-2.0 paragraph 4 section (d).
* d/control:
- Alphabetically sorted Build-Depends.
- Added tree to Build-Depends for debugging purposes.
- Fixed descriptions with invalid control statements
(lines containing a space, a full stop and some more characters)
to comply with Section 5.6.13 in the Debian Policy Manual.
- Added dotnet-runtime-dbg-8.0, aspnetcore-runtime-dbg-8.0,
dotnet-sdk-dbg-8.0 to dotnet8 Suggests.
* d/copyright:
- Refresh copyright info.
- Add LGPL-2.1 license text.
* d/rules: Added override_dh_auto_clean to remove .NET and Python
binary artifacts.
* lintian overrides:
- Silenced dotnet-sdk-8.0-source-built-artifacts: package-has-long-file-name
The long file name is unavoidable.
- Silenced FO127 related lintian warning
hyphen-in-upstream-part-of-debian-changelog-version.
- Silenced manpage troff warnings. Troff complains that it is silly that the
dotnet8 manpages select a monospace font on a terminal output that only
supports monospace fonts.
-- Dominik Viererbe <email address hidden> Wed, 15 Jan 2025 20:11:26 +0200
|
2094272 |
[SRU] New upstream microrelease .NET 8.0.112/8.0.12 |
CVE-2025-21172 |
.NET and Visual Studio Remote Code Execution Vulnerability |
CVE-2025-21176 |
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
CVE-2025-21173 |
.NET Elevation of Privilege Vulnerability |
|
About
-
Send Feedback to @ubuntu_updates