Bug 2263085 (CVE-2024-21386) - CVE-2024-21386 dotnet: Denial of Service in SignalR server
Summary: CVE-2024-21386 dotnet: Denial of Service in SignalR server
Keywords:
Status: NEW
Alias: CVE-2024-21386
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2264132 2264133 2264134 2263127
Blocks: 2263084
TreeView+ depends on / blocked
 
Reported: 2024-02-06 23:50 UTC by Marco Benatto
Modified: 2024-02-20 00:31 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service vulnerability is present in the .NET applications utilizing SignalR, which a malicious client can exploit. The issue arises from inadequate validation of user-supplied input in .NET. This flaw allows a remote attacker to trigger a denial of service (DoS) attack by providing specially crafted input.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:0841 0 None None None 2024-02-15 12:23:56 UTC
Red Hat Product Errata RHBA-2024:0842 0 None None None 2024-02-15 12:38:29 UTC
Red Hat Product Errata RHBA-2024:0870 0 None None None 2024-02-20 00:31:30 UTC
Red Hat Product Errata RHSA-2024:0805 0 None None None 2024-02-13 18:41:26 UTC
Red Hat Product Errata RHSA-2024:0806 0 None None None 2024-02-13 18:48:35 UTC
Red Hat Product Errata RHSA-2024:0807 0 None None None 2024-02-13 18:41:51 UTC
Red Hat Product Errata RHSA-2024:0808 0 None None None 2024-02-13 18:48:43 UTC
Red Hat Product Errata RHSA-2024:0814 0 None None None 2024-02-14 08:54:39 UTC
Red Hat Product Errata RHSA-2024:0827 0 None None None 2024-02-15 07:23:22 UTC
Red Hat Product Errata RHSA-2024:0848 0 None None None 2024-02-15 14:37:00 UTC

Description Marco Benatto 2024-02-06 23:50:58 UTC
DoS - SignalR server

Affected versions:
.NET 6.0
.NET 7.0
.NET 8.0

Comment 3 errata-xmlrpc 2024-02-13 18:41:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0805 https://access.redhat.com/errata/RHSA-2024:0805

Comment 4 errata-xmlrpc 2024-02-13 18:41:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0807 https://access.redhat.com/errata/RHSA-2024:0807

Comment 5 errata-xmlrpc 2024-02-13 18:48:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0806 https://access.redhat.com/errata/RHSA-2024:0806

Comment 6 errata-xmlrpc 2024-02-13 18:48:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0808 https://access.redhat.com/errata/RHSA-2024:0808

Comment 7 TEJ RATHI 2024-02-14 06:17:37 UTC
Created dotnet6.0 tracking bugs for this issue:

Affects: fedora-all [bug 2264132]


Created dotnet7.0 tracking bugs for this issue:

Affects: fedora-all [bug 2264133]


Created dotnet8.0 tracking bugs for this issue:

Affects: fedora-all [bug 2264134]

Comment 8 errata-xmlrpc 2024-02-14 08:54:38 UTC
This issue has been addressed in the following products:

  .NET Core on Red Hat Enterprise Linux

Via RHSA-2024:0814 https://access.redhat.com/errata/RHSA-2024:0814

Comment 9 errata-xmlrpc 2024-02-15 07:23:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0827 https://access.redhat.com/errata/RHSA-2024:0827

Comment 10 errata-xmlrpc 2024-02-15 14:36:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0848 https://access.redhat.com/errata/RHSA-2024:0848


Note You need to log in before you can comment on or make changes to this bug.