[ASA-202105-23] dotnet-sdk-3.1: privilege escalation

Jonas Witschel diabonas at archlinux.org
Wed May 26 10:33:27 UTC 2021


Arch Linux Security Advisory ASA-202105-23
==========================================

Severity: Medium
Date    : 2021-05-25
CVE-ID  : CVE-2021-31204
Package : dotnet-sdk-3.1
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-1945

Summary
=======

The package dotnet-sdk-3.1 before version 3.1.15.sdk115-1 is vulnerable
to privilege escalation.

Resolution
==========

Upgrade to 3.1.15.sdk115-1.

# pacman -Syu "dotnet-sdk-3.1>=3.1.15.sdk115-1"

The problem has been fixed upstream in version 3.1.15.sdk115.

Workaround
==========

None.

Description
===========

An elevation of privilege vulnerability exists in .NET 5.0 and .NET
Core 3.1 when a user runs a single file application on operating
systems based on Linux or macOS. The issue is fixed in .NET 5.0,
Runtime 5.0.6 and SDK 5.0.203, as well as .NET Core 3.1, Runtime 3.1.15
and SDK 3.1.115.

Impact
======

An attacker could elevate privileges from a crafted single file
application.

References
==========

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31204
https://github.com/dotnet/announcements/issues/185
https://security.archlinux.org/CVE-2021-31204
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210526/27e83d7e/attachment.sig>


More information about the arch-security mailing list