UbuntuUpdates.org

Package "dotnet9"

Name: dotnet9

Description:

.NET CLI tools and runtime

Latest version: 9.0.114-9.0.13-0ubuntu1~25.10.1
Release: questing (25.10)
Level: security
Repository: universe
Homepage: https://dot.net

Links


Download "dotnet9"


Other versions of "dotnet9" in Questing

Repository Area Version
base universe 9.0.110-9.0.9-0ubuntu1
updates universe 9.0.114-9.0.13-0ubuntu1~25.10.1
proposed universe 9.0.113-9.0.12-0ubuntu1~25.10.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 9.0.114-9.0.13-0ubuntu1~25.10.1 2026-02-11 05:07:49 UTC

  dotnet9 (9.0.114-9.0.13-0ubuntu1~25.10.1) questing; urgency=medium

  * New upstream release
  * SECURITY UPDATE: security feature bypass
    - CVE-2026-21218: An attacker could exploit this vulnerability in
      System.Security.Cryptography.Cose by crafting a malicious payload that
      bypasses the security checks in the affected .NET versions, potentially
      leading to unauthorized access or data manipulation.
  * d/p/0002-roslyn-analyzers-dont-use-apphost.patch: refreshed patch to fix
    hunk failure.

 -- Mateus Rodrigues de Morais <email address hidden> Mon, 02 Feb 2026 17:30:30 -0300

Source diff to previous version
CVE-2026-21218 Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoofing over a network.

Version: 9.0.111-9.0.10-0ubuntu1~25.10.1 2025-10-14 21:09:00 UTC

  dotnet9 (9.0.111-9.0.10-0ubuntu1~25.10.1) questing; urgency=medium

  * New upstream release
  * SECURITY UPDATE: denial of service
    - CVE-2025-55247: A vulnerability exists in .NET Core where predictable
      paths for MSBuild's temporary directories on Linux let another user
      create the directories ahead of MSBuild, leading to DoS of builds.
  * SECURITY UPDATE: validation bypass
    - CVE-2025-55315: Inconsistent interpretation of http requests
      ('http request/response smuggling') in ASP.NET Core allows an authorized
      attacker to bypass a security feature over a network.
  * SECURITY UPDATE: information disclosure
    - CVE-2025-55248: MITM (man in the middle) attacker may prevent use of TLS
      between client and SMTP server, forcing client to send data over
      unencrypted connection.
  * eng/test-runner: sync changes with upstream
  * tests/control, tests/regular-tests: sync changes with upstream
  * debian/rules: use release.json manifest instead of legacy text file

 -- Dominik Viererbe <email address hidden> Wed, 08 Oct 2025 13:49:49 +0300

CVE-2025-55247 Improper link resolution before file access ('link following') in .NET ...
CVE-2025-55315 Inconsistent interpretation of http requests ('http request/response s ...
CVE-2025-55248 Inadequate encryption strength in .NET, .NET Framework, Visual Studio ...



About   -   Send Feedback to @ubuntu_updates