what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2019-0544-01

Red Hat Security Advisory 2019-0544-01
Posted Mar 13, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0544-01 - .NET Core is a managed-software framework. It implements the .NET standard APIs and several additional APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core 1.0.15, 1.1.12, 2.1.9, and 2.2.3. Issues addressed include a tampering vulnerability.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-0757
SHA-256 | 315de1f385d4b9b7efd6da8ea7a70e26ab7580be9bceebb35a516d527cc79e62

Red Hat Security Advisory 2019-0544-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: .NET Core on Red Hat Enterprise Linux security update for March 2019
Advisory ID: RHSA-2019:0544-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0544
Issue date: 2019-03-13
CVE Names: CVE-2019-0757
====================================================================
1. Summary:

Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore,
rh-dotnet21-dotnet, and rh-dotnet22-dotnet are now available for .NET Core
on Red Hat Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

.NET Core is a managed-software framework. It implements the .NET standard
APIs and several additional APIs, and it includes a CLR implementation.

New versions of .NET Core that address security vulnerabilities are now
available. The updated versions are .NET Core 1.0.15, 1.1.12, 2.1.9, and
2.2.3.

Security Fix(es):

* A tampering vulnerability exists in NuGet software when executed in a
Linux or Mac environment. (CVE-2019-0757)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

For more information, please refer to the upstream doc in the References
section.

4. Solution:

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1685475 - CVE-2019-0757 dotnet: NuGet Tampering Vulnerability
1685718 - Update to .NET Core Runtime 2.2.3 and SDK 2.2.105
1685720 - Update to .NET Core Runtime 2.1.9 and SDK 2.1.505

6. Package List:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.15-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.15-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.12-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.12-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnet21-2.1-8.el7.src.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.src.rpm

x86_64:
rh-dotnet21-2.1-8.el7.x86_64.rpm
rh-dotnet21-dotnet-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.9-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.505-1.el7.x86_64.rpm
rh-dotnet21-runtime-2.1-8.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnet22-2.2-4.el7.src.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.src.rpm

x86_64:
rh-dotnet22-2.2-4.el7.x86_64.rpm
rh-dotnet22-dotnet-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-debuginfo-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-host-fxr-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-runtime-2.2-2.2.3-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.105-1.el7.x86_64.rpm
rh-dotnet22-runtime-2.2-4.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-0757
https://access.redhat.com/security/updates/classification/#important
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0757

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXIkN2NzjgjWX9erEAQifeg//caOX+S+Ysy634WnQ2WKfvAyI2DdmDwtN
jsAXT/zd2ckQrk3Idz09zDrrX3bjCbGSALUEF8DNM9X0xs8LiFJj9fl7pQ8eDDuz
csbAv7Th64q9m42KlL4+7s4HBzRRDpfp90JMr9zYWHqoDsYbHi/03wUJbM81txYt
Ybu1oufw3DNzDoPiZ30x1HvNUa4ZHPrB2eV6gVc4kbTZDG08oDvBHCnS9IXbMPRC
sfkGHU6E+kWS6bs2aHMbSNiw2MkKPgRbMXv10o8FRLbXVJ9swiEgBz0rmuirlxkM
Zubf4mWUGnLIksPzTYrRrGpCbWduD5dR0Ar+DiLaSRmJQ7rzBTFdoBFWwaN+HoGu
tGwrCe2Ve+Aj8WP3EBxHSmhEG9UT2KxmUSA++lqiw3wZBVHBZD9YX1aP0c8j7tCg
ijhAzzfo1rbCRJkKdACAbxjih4jjHRzt6x3W/qmu3n+gIKXHGelGoKouyvbKb+8A
eqQXoB/W/Dkcz/XHfcII7bDNxZLbT7HVV1fdFAQqGrMcwknVC5ld+N0dnE6tn45r
LfDyuyO8Sd+7jDilvdEdWYyI6pbRuRNmcZ+gqu/xPyx5cFXYxQehdv1uIAo5vQP1
35JSu//LGlnoYeYhBoYrtW/forYD77yLKHnlP6/ugcN1JKS+CRAipuDW8nr34ySR
FvFvp8/nSm4=KwTi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close