-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: dotnet3.1 security and bugfix update Advisory ID: RHSA-2021:2037-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2037 Issue date: 2021-05-19 CVE Names: CVE-2021-31204 ==================================================================== 1. Summary: An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - x86_64 3. Description: .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.115 and .NET Core Runtime 3.1.15. Security Fix(es): * dotnet: .NET Core single-file application privilege escalation (CVE-2021-31204) In order for the update to be complete, self-contained applications deployed using previous versions need to be recompiled and redeployed. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1956815 - CVE-2021-31204 dotnet: .NET Core single-file application privilege escalation 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: dotnet3.1-3.1.115-1.el8_4.src.rpm x86_64: aspnetcore-runtime-3.1-3.1.15-1.el8_4.x86_64.rpm aspnetcore-targeting-pack-3.1-3.1.15-1.el8_4.x86_64.rpm dotnet-apphost-pack-3.1-3.1.15-1.el8_4.x86_64.rpm dotnet-apphost-pack-3.1-debuginfo-3.1.15-1.el8_4.x86_64.rpm dotnet-hostfxr-3.1-3.1.15-1.el8_4.x86_64.rpm dotnet-hostfxr-3.1-debuginfo-3.1.15-1.el8_4.x86_64.rpm dotnet-runtime-3.1-3.1.15-1.el8_4.x86_64.rpm dotnet-runtime-3.1-debuginfo-3.1.15-1.el8_4.x86_64.rpm dotnet-sdk-3.1-3.1.115-1.el8_4.x86_64.rpm dotnet-sdk-3.1-debuginfo-3.1.115-1.el8_4.x86_64.rpm dotnet-targeting-pack-3.1-3.1.15-1.el8_4.x86_64.rpm dotnet-templates-3.1-3.1.115-1.el8_4.x86_64.rpm dotnet3.1-debuginfo-3.1.115-1.el8_4.x86_64.rpm dotnet3.1-debugsource-3.1.115-1.el8_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-31204 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYKThkNzjgjWX9erEAQiF+Q//Z2tK3morp1GI0rTTbvf8ODON0vQxKXQo 9SF32Osl4dHmCJqvCeuuZY2MyP1J2IrM7H1qry49L2TRwWsToaIi+8VtIqc+5yTG 1UqKavnrk7uj5bkusB4cLFKeq840i4Q3EfICMVhGz/MWIfGlwEFm77nDYQljbpEd k1n402DLtvKP0zhpxeLbgxOsoz3+cYGd6I/w0kxhkcdFrEQ27KLHkp58hyj/poOk hMzu5ppbV3IilgmZmDGpxymBJ6LoPWld0+AdWRRKxIo1pYH+36f2q2ZyltWSuPCm eayD6x7cM1UUtOspr44407QVxDYKv2TO1nIdVPtWs2wO0fz9GmmmUGV3vfZCxJtf Vy+1HFtQzKOmH9WAF0hJ0g5zNVzPoXrN8NkPi5DYyV2VIJz5MBJLgw3UmdCrceaO zpCLNpntNwG5CQIWKHLBEifyjOprz9n9VfimmFcuu2gnYthObfkMw6fBoRGwyKFV fVMF46mkMsmVMHgbxgY0nu2U/9g6Rjm3TS+NCLuP2l2e2jWDhRdk6I4OiYfuEhGW wHUoCjNbfdqY6kiBf46BEuQvMSNglwb1B6qHf2DJmMMV5RtjHHjvqYWqNJNIctDG WY7zhBHIqRNItKkW2SRdf1QBV8LwY/8iJmFibqGHOiu4SidVOcCRoCo3tpgI0U3I ugFvyCI7eOk=YzuO -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce