[ASA-202105-21] dotnet-runtime: privilege escalation

Jonas Witschel diabonas at archlinux.org
Wed May 26 10:33:05 UTC 2021


Arch Linux Security Advisory ASA-202105-21
==========================================

Severity: Medium
Date    : 2021-05-25
CVE-ID  : CVE-2021-31204
Package : dotnet-runtime
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-1944

Summary
=======

The package dotnet-runtime before version 5.0.6.sdk203-1 is vulnerable
to privilege escalation.

Resolution
==========

Upgrade to 5.0.6.sdk203-1.

# pacman -Syu "dotnet-runtime>=5.0.6.sdk203-1"

The problem has been fixed upstream in version 5.0.6.sdk203.

Workaround
==========

None.

Description
===========

An elevation of privilege vulnerability exists in .NET 5.0 and .NET
Core 3.1 when a user runs a single file application on operating
systems based on Linux or macOS. The issue is fixed in .NET 5.0,
Runtime 5.0.6 and SDK 5.0.203, as well as .NET Core 3.1, Runtime 3.1.15
and SDK 3.1.115.

Impact
======

An attacker could elevate privileges from a crafted single file
application.

References
==========

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31204
https://github.com/dotnet/announcements/issues/185
https://security.archlinux.org/CVE-2021-31204
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210526/8a35153d/attachment-0001.sig>


More information about the arch-security mailing list