[Bug 2080023] Re: [SRU] Enable s390x and ppc64el for .NET 8 on Jammy
Launchpad Bug Tracker
2080023 at bugs.launchpad.net
Tue Oct 8 17:53:07 UTC 2024
This bug was fixed in the package dotnet8 -
8.0.110-8.0.10-0ubuntu1~22.04.1
---------------
dotnet8 (8.0.110-8.0.10-0ubuntu1~22.04.1) jammy-security; urgency=medium
* New upstream release
* SECURITY UPDATE: remote code execution
- CVE-2024-38229: Kestrel http/3 - When closing an HTTP/3 stream while
application code is writing to the response body, a race condition may
lead to remote code execution.
* SECURITY UPDATE: denial of service
- CVE-2024-43483: Multiple .NET components designed to process hostile
input are susceptible to hash flooding attacks.
* SECURITY UPDATE: denial of service
- CVE-2024-43484: System.IO.Packaging - Multiple DoS vectors in use of
SortedList.
* SECURITY UPDATE: denial of service
- CVE-2024-43485: Denial of Service attack against System.Text.Json
ExtensionData feature.
-- Ian Constantin <ian.constantin at canonical.com> Wed, 02 Oct 2024
09:54:14 +0300
** Changed in: dotnet8 (Ubuntu Jammy)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38229
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43483
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43484
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43485
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to dotnet8 in Ubuntu.
https://bugs.launchpad.net/bugs/2080023
Title:
[SRU] Enable s390x and ppc64el for .NET 8 on Jammy
Status in dotnet8 package in Ubuntu:
Fix Released
Status in dotnet8 source package in Jammy:
Fix Released
Bug description:
Upload available in PPA: https://launchpad.net/~dotnet-
bootstrap/+archive/ubuntu/dotnet8.0.108-jammy-stage2
[ Impact ]
* This SRU aims to enable the s390x and ppc64el architectures on .NET 8
targeting Ubuntu 22.04 (Jammy Jellyfish). These architectures have
already been enabled for .NET 8 on Oracular Oriole and Noble Numbat.
* This is part of the .NET team's roadmap for the Oracular Oriole
cycle.
* Per the changelog of the package in the PPA, the changes introduced in
this upload are only related to the enablement of s390x and ppc64el.
[ Test Plan ]
* Run the steps outlined in the .NET SRU Test Plan document [1] on an s390x
and ppc64el machine.
[ Where problems could occur ]
* s390x and ppc64el have already been enabled for .NET 8 on Oracular and
Noble.
* The patches introduced to fix various FTBFS and autopkgtest failures on
ppc64el are only modifying parameters in unit test projects within the
.NET code-base as well as the autopkgtest test runner code-base and its
related libraries. These should not impact "shippable" products that land
in the final binary packages.
* If a problem occurs, it would be limited to .NET on s390x and ppc64el and
will show up when using the product with normal day-to-day operations,
which the test plan should be able to reproduce.
[ Other Info ]
* The s390x and ppc64el builds will require a bootstrap once they hit
-proposed. The bootstrap packages have been prepared and are available
in PPAs [2][3]. They will be uploaded to the Ubuntu Bootstrap PPA by an
Archive Admin once we're ready to bootstrap.
* When this upload hits -proposed, the s390x and ppc64el builds will stay
in dependency wait status until the bootstrap packages are uploaded and
the Launchpad team triggers the bootstrap. The .NET team
(Toolchains/Foundations) will drive the coordination of these tasks once
we're there.
[0] https://bugs.launchpad.net/ubuntu/noble/+source/dotnet8/+bug/2064530
[1] https://github.com/canonical/dotnet-source-build/blob/main/docs/SRUTestPlan.md
[2] https://launchpad.net/~dotnet-bootstrap/+archive/ubuntu/dotnet8.0.108-jammy-stage1-s390x
[3] https://launchpad.net/~dotnet-bootstrap/+archive/ubuntu/dotnet8.0.108-jammy-stage1-ppc64el
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dotnet8/+bug/2080023/+subscriptions
More information about the foundations-bugs
mailing list