CVE-2011-0990

NameCVE-2011-0990
DescriptionRace condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file in which a thread makes a change after a type check but before a copy action.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mono (PTS)buster5.18.0.240+dfsg-3fixed
buster (security)5.18.0.240+dfsg-3+deb10u1fixed
bullseye6.8.0.105+dfsg-3.3~deb11u1fixed
bookworm6.8.0.105+dfsg-3.3fixed
sid, trixie6.8.0.105+dfsg-3.6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
monosource(unstable)(not affected)

Notes

- mono <not-affected> (Moonlight no longer present in Debian)

Search for package or bug name: Reporting problems