what you don't know can hurt you

Red Hat Security Advisory 2019-0544-01

Red Hat Security Advisory 2019-0544-01
Posted Mar 13, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0544-01 - .NET Core is a managed-software framework. It implements the .NET standard APIs and several additional APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core 1.0.15, 1.1.12, 2.1.9, and 2.2.3. Issues addressed include a tampering vulnerability.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-0757
MD5 | 83019d7c9a60ad8d3a6cfddc224cb6d3

Red Hat Security Advisory 2019-0544-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: .NET Core on Red Hat Enterprise Linux security update for March 2019
Advisory ID: RHSA-2019:0544-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0544
Issue date: 2019-03-13
CVE Names: CVE-2019-0757
====================================================================
1. Summary:

Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, and rh-dotnet22-dotnet are now available for .NET Core
on Red Hat Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

.NET Core is a managed-software framework. It implements the .NET standard
APIs and several additional APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now
available. The updated versions are .NET Core 1.0.15, 1.1.12, 2.1.9, and
2.2.3.

Security Fix(es):

* A tampering vulnerability exists in NuGet software when executed in a
Linux or Mac environment. (CVE-2019-0757)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

For more information, please refer to the upstream doc in the References
section.

4. Solution:

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1685475 - CVE-2019-0757 dotnet: NuGet Tampering Vulnerability
1685718 - Update to .NET Core Runtime 2.2.3 and SDK 2.2.105
1685720 - Update to .NET Core Runtime 2.1.9 and SDK 2.1.505

6. Package List:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-0757
https://access.redhat.com/security/updates/classification/#important
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0757

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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KwTi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    1 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close