SB2026042923 - Ubuntu update for dotnet10
Published: April 29, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Infinite loop (CVE-ID: CVE-2026-33116)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in .NET, .NET Framework, and Visual Studio. A remote attacker can consume all available system resources and cause denial of service conditions.
2) Resource exhaustion (CVE-ID: CVE-2026-26171)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in .NET. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Stack-based buffer overflow (CVE-ID: CVE-2026-32203)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in .NET and Visual Studio. A remote unauthenticated attacker can trigger stack-based buffer overflow and cause a denial of service condition on the target system.
4) Improper Neutralization of Special Elements (CVE-ID: CVE-2026-32178)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper neutralization of special elements in .NET. A remote attacker can perform spoofing attack.
5) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2026-40372)
The vulnerability allows a remote attacker to elevate privileges.
The vulnerability exists due to improper verification of cryptographic signature in Microsoft.AspNetCore.DataProtection when processing cryptographically protected payloads. A remote attacker can send specially crafted data to elevate privileges.
Successful exploitation could result in SYSTEM privileges. The issue affects deployments where the NuGet copy of the library is loaded at runtime, including non-Windows deployments using the vulnerable code path and certain configurations using managed algorithms.
Remediation
Install update from vendor's website.