Package "dotnet9"
| Name: |
dotnet9
|
Description: |
.NET CLI tools and runtime
|
| Latest version: |
9.0.116-9.0.15-0ubuntu1~25.10.1 |
| Release: |
questing (25.10) |
| Level: |
security |
| Repository: |
universe |
| Homepage: |
https://dot.net |
Links
Download "dotnet9"
Other versions of "dotnet9" in Questing
Packages in group
Deleted packages are displayed in grey.
Changelog
|
dotnet9 (9.0.116-9.0.15-0ubuntu1~25.10.1) questing-security; urgency=medium
[ Mateus Rodrigues de Morais ]
* New upstream release
* SECURITY UPDATE: denial of service
- CVE-2026-33116: Possible denial of service via infinite recursion in
XmlDecryptionTransform.
* SECURITY UPDATE: denial of service
- CVE-2026-32203: Possible denial of service via stack overflow in
EncryptedKey nested decryption.
* SECURITY UPDATE: remote code execution
- CVE-2026-32178: SMTP command injection and header injection via
MailAddress parsing flaw in System.Net.Mail.
* SECURITY UPDATE: security feature bypass
- CVE-2026-26171: denial of service and security feature bypass via unsafe
transforms in EncryptedXml.
-- Ian Constantin <email address hidden> Tue, 14 Apr 2026 19:43:50 +0000
|
| Source diff to previous version |
| CVE-2026-33116 |
Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, Visual Studio allows an unauthorized attacker to deny service over a |
| CVE-2026-32203 |
Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized attacker to deny service over a network. |
| CVE-2026-32178 |
Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network. |
| CVE-2026-26171 |
Uncontrolled resource consumption in .NET allows an unauthorized attacker to deny service over a network. |
|
|
dotnet9 (9.0.115-9.0.14-0ubuntu1~25.10.1) questing-security; urgency=medium
[ Mateus Rodrigues de Morais ]
* New upstream release
* SECURITY UPDATE: denial of service
- CVE-2026-26130: Possible denial-of-service via SignalR stateful
reconnect buffer overfill.
* SECURITY UPDATE: denial of service
- CVE-2026-26127: System.Buffers.Text.Base64Url.DecodeFromChars
out-of-bounds read from malformed Base64Url input. A bug in the
implementation causes out-of-bound reads of the DecodingMap, potentially
leading to Access Violation Exceptions (AVEs) when unsafe code is used.
-- Ian Constantin <email address hidden> Sun, 08 Mar 2026 21:28:24 +0200
|
| Source diff to previous version |
| CVE-2026-26130 |
Allocation of resources without limits or throttling in ASP.NET Core a ... |
| CVE-2026-26127 |
Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network. |
|
|
dotnet9 (9.0.114-9.0.13-0ubuntu1~25.10.1) questing; urgency=medium
* New upstream release
* SECURITY UPDATE: security feature bypass
- CVE-2026-21218: An attacker could exploit this vulnerability in
System.Security.Cryptography.Cose by crafting a malicious payload that
bypasses the security checks in the affected .NET versions, potentially
leading to unauthorized access or data manipulation.
* d/p/0002-roslyn-analyzers-dont-use-apphost.patch: refreshed patch to fix
hunk failure.
-- Mateus Rodrigues de Morais <email address hidden> Mon, 02 Feb 2026 17:30:30 -0300
|
| Source diff to previous version |
| CVE-2026-21218 |
Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoofing over a network. |
|
|
dotnet9 (9.0.111-9.0.10-0ubuntu1~25.10.1) questing; urgency=medium
* New upstream release
* SECURITY UPDATE: denial of service
- CVE-2025-55247: A vulnerability exists in .NET Core where predictable
paths for MSBuild's temporary directories on Linux let another user
create the directories ahead of MSBuild, leading to DoS of builds.
* SECURITY UPDATE: validation bypass
- CVE-2025-55315: Inconsistent interpretation of http requests
('http request/response smuggling') in ASP.NET Core allows an authorized
attacker to bypass a security feature over a network.
* SECURITY UPDATE: information disclosure
- CVE-2025-55248: MITM (man in the middle) attacker may prevent use of TLS
between client and SMTP server, forcing client to send data over
unencrypted connection.
* eng/test-runner: sync changes with upstream
* tests/control, tests/regular-tests: sync changes with upstream
* debian/rules: use release.json manifest instead of legacy text file
-- Dominik Viererbe <email address hidden> Wed, 08 Oct 2025 13:49:49 +0300
|
| CVE-2025-55247 |
Improper link resolution before file access ('link following') in .NET ... |
| CVE-2025-55315 |
Inconsistent interpretation of http requests ('http request/response s ... |
| CVE-2025-55248 |
Inadequate encryption strength in .NET, .NET Framework, Visual Studio ... |
|
About
-
Send Feedback to @ubuntu_updates