Action not permitted
Modal body text goes here.
cve-2020-0603
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2020:0130 | Third Party Advisory | |
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2020:0134 | Third Party Advisory | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603 | Patch, Vendor Advisory |
▼ | Vendor | Product |
---|---|---|
Microsoft | ASP.NET Core |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" }, { "name": "RHSA-2020:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ASP.NET Core", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-16T19:06:09", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" }, { "name": "RHSA-2020:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0603", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ASP.NET Core", "version": { "version_data": [ { "version_value": "2.1" }, { "version_value": "3.0" }, { "version_value": "3.1" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-0603", "datePublished": "2020-01-14T23:11:21", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-08-04T06:11:04.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-0603\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2020-01-14T23:15:30.347\",\"lastModified\":\"2021-07-21T11:39:23.747\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en el software ASP.NET Core cuando el software presenta un fallo al manejar los objetos en memoria. Un atacante que explot\u00f3 con \u00e9xito la vulnerabilidad podr\u00eda ejecutar c\u00f3digo arbitrario en el contexto del usuario actual, tambi\u00e9n se conoce como \\\"ASP.NET Core Remote Code Execution Vulnerability\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C3047E-C222-4636-B1B3-722F2C65BC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4319AB8-5013-46B4-8E3C-6FDCFC65FC7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE4072E-3226-435C-BC61-A775D3EF2822\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0130\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0134\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
ghsa-655q-9gvg-q4cm
Vulnerability from github
A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka 'ASP.NET Core Remote Code Execution Vulnerability'.
{ "affected": [ { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.All" }, "ranges": [ { "events": [ { "introduced": "2.1.0" }, { "fixed": "2.1.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.1.0" ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "3.0.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.0.0" ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "2.1.0" }, { "fixed": "2.1.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.Http.Connections" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "1.0.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.osx-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x86" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-0603" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": true, "github_reviewed_at": "2022-07-07T23:10:27Z", "nvd_published_at": "2020-01-14T23:15:00Z", "severity": "HIGH" }, "details": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "id": "GHSA-655q-9gvg-q4cm", "modified": "2022-07-07T23:10:27Z", "published": "2022-05-24T17:06:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603" }, { "type": "WEB", "url": "https://github.com/aspnet/Announcements/issues/403" }, { "type": "WEB", "url": "https://github.com/github/advisory-database/issues/302" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0134" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" } ], "schema_version": "1.4.0", "severity": [], "summary": "Remote code execution in ASP.NET Core" }
gsd-2020-0603
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-0603", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "id": "GSD-2020-0603", "references": [ "https://access.redhat.com/errata/RHSA-2020:0134", "https://access.redhat.com/errata/RHSA-2020:0130", "https://linux.oracle.com/cve/CVE-2020-0603.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-0603" ], "details": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "id": "GSD-2020-0603", "modified": "2023-12-13T01:21:44.487956Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0603", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ASP.NET Core", "version": { "version_data": [ { "version_value": "2.1" }, { "version_value": "3.0" }, { "version_value": "3.1" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.1],[3.0,3.1]", "affected_versions": "Version 2.1, all versions starting from 3.0 up to 3.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-787", "CWE-937" ], "date": "2021-07-21", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "CVE-2020-0603" ], "not_impacted": "All versions before 2.1, all versions after 2.1 before 3.0, all versions after 3.1", "package_slug": "nuget/Microsoft.AspNetCore.All", "pubdate": "2020-01-14", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134" ], "uuid": "38e9920c-42a0-4b99-b612-197ab3589506" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "945ff538-5993-4a15-a990-26c59739cca5" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "d12a6ea8-000c-4256-83d1-80b9700e0102" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "15491288-4aa0-43cd-8ef2-69393b7f4173" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "e2fb21fa-d356-4ad0-97d1-26a3693f1f86" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "8a4d610b-8bf1-4224-a79b-307555729d96" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.osx-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "432b179c-8474-4eb8-a3f2-e1b0a9c4a2a1" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "e0594a35-7e78-41b3-b654-2a02f39c3dc2" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "ef4af269-2dd8-45c5-a0ab-8decd3411916" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-10-31", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x86", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "eacb51c8-2768-4d18-ba84-ef497091d868" }, { "affected_range": "[2.1.0,2.1.15),[3.0.0,3.1.0]", "affected_versions": "All versions starting from 2.1.0 before 2.1.15, all versions starting from 3.0.0 up to 3.1.0", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-07-07", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "3.1.1", "2.1.15" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 2.1.0, all versions starting from 2.1.15 before 3.0.0, all versions after 3.1.0", "package_slug": "nuget/Microsoft.AspNetCore.App", "pubdate": "2022-05-24", "solution": "Upgrade to versions 3.1.1, 2.1.15 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "ba7fe885-3fbd-40f0-b0f5-12f89a01c0c4" }, { "affected_range": "[1.0.0,1.0.15)", "affected_versions": "All versions starting from 1.0.0 before 1.0.15", "cvss_v2": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-787", "CWE-937" ], "date": "2022-07-07", "description": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027.", "fixed_versions": [ "1.0.15" ], "identifier": "CVE-2020-0603", "identifiers": [ "GHSA-655q-9gvg-q4cm", "CVE-2020-0603" ], "not_impacted": "All versions before 1.0.0, all versions starting from 1.0.15", "package_slug": "nuget/Microsoft.AspNetCore.Http.Connections", "pubdate": "2022-05-24", "solution": "Upgrade to version 1.0.15 or above.", "title": "Out-of-bounds Write", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "https://github.com/aspnet/Announcements/issues/403", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-655q-9gvg-q4cm" ], "uuid": "b4c60152-7837-4681-922a-1cf390e2af72" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0603" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "N/A", "refsource": "N/A", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-07-21T11:39Z", "publishedDate": "2020-01-14T23:15Z" } } }
rhsa-2020_0134
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1.\n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nUsers must rebuild their applications to pick up the fixes.\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0134", "url": "https://access.redhat.com/errata/RHSA-2020:0134" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1787151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787151" }, { "category": "external", "summary": "1787174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787174" }, { "category": "external", "summary": "1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0134.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:43:48+00:00", "generator": { "date": "2024-11-05T21:43:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0134", "initial_release_date": "2020-01-16T16:33:46+00:00", "revision_history": [ { "date": "2020-01-16T16:33:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-16T16:33:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:43:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-runtime-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-targeting-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-apphost-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-host@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-hostfxr-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-runtime-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-sdk-3.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-targeting-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-templates-3.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-netstandard-targeting-pack-2.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-debuginfo@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-aspnetcore-runtime-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-aspnetcore-targeting-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-apphost-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-host@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-hostfxr-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-runtime-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-sdk-3.0@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-targeting-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-templates-3.0@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-netstandard-targeting-pack-2.1@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-debuginfo@3.0.102-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product_id": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.101-4.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product_id": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet@3.0.102-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0602", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789623" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in ASP.NET Core. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted requests to an ASP.NET Core application. The highest threat from this flaw is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Denial of service via backpressure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0602" }, { "category": "external", "summary": "RHBZ#1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/402", "url": "https://github.com/aspnet/Announcements/issues/402" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T16:33:46+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: Denial of service via backpressure issue" }, { "cve": "CVE-2020-0603", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789624" } ], "notes": [ { "category": "description", "text": "A memory corruption flaw was found in ASP.NET core. A client can write to freed memory on the server which could result in undefined behavior. An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code by sending specially crafted requests to an ASP.NET Core application.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Memory Corruption in SignalR", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0603" }, { "category": "external", "summary": "RHBZ#1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/403", "url": "https://github.com/aspnet/Announcements/issues/403" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T16:33:46+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dotnet: Memory Corruption in SignalR" } ] }
rhsa-2020_0130
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dotnet3.0 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102 and .NET Core Runtime 3.0.2.\n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0130", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1788171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788171" }, { "category": "external", "summary": "1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0130.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:42:36+00:00", "generator": { "date": "2024-11-05T21:42:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0130", "initial_release_date": "2020-01-16T15:04:43+00:00", "revision_history": [ { "date": "2020-01-16T15:04:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-16T15:04:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:42:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-runtime-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.0@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-targeting-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-templates-3.0@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product": { "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product_id": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0-debugsource@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.0-debuginfo@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0-debuginfo@3.0.102-2.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dotnet3.0-0:3.0.102-2.el8_1.src", "product": { "name": "dotnet3.0-0:3.0.102-2.el8_1.src", "product_id": "dotnet3.0-0:3.0.102-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0@3.0.102-2.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-0:3.0.102-2.el8_1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src" }, "product_reference": "dotnet3.0-0:3.0.102-2.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0602", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789623" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in ASP.NET Core. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted requests to an ASP.NET Core application. The highest threat from this flaw is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Denial of service via backpressure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0602" }, { "category": "external", "summary": "RHBZ#1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/402", "url": "https://github.com/aspnet/Announcements/issues/402" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T15:04:43+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0130" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: Denial of service via backpressure issue" }, { "cve": "CVE-2020-0603", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789624" } ], "notes": [ { "category": "description", "text": "A memory corruption flaw was found in ASP.NET core. A client can write to freed memory on the server which could result in undefined behavior. An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code by sending specially crafted requests to an ASP.NET Core application.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Memory Corruption in SignalR", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0603" }, { "category": "external", "summary": "RHBZ#1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/403", "url": "https://github.com/aspnet/Announcements/issues/403" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T15:04:43+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0130" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dotnet: Memory Corruption in SignalR" } ] }
var-202001-0123
Vulnerability from variot
A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka 'ASP.NET Core Remote Code Execution Vulnerability'. Microsoft ASP.NET Core is a cross-platform open source framework from Microsoft Corporation in the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability stems from a program's inability to handle memory objects. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Critical: .NET Core on Red Hat Enterprise Linux security and bug fix update Advisory ID: RHSA-2020:0134-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0134 Issue date: 2020-01-16 CVE Names: CVE-2020-0602 CVE-2020-0603 ==================================================================== 1. Summary:
An update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1.
Security Fixes:
-
dotnet: Memory Corruption in SignalR (CVE-2020-0603)
-
dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)
Users must rebuild their applications to pick up the fixes.
Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1787151 - Update .NET Core 3.0 to Runtime 3.0.2 and SDK 3.0.102 1787174 - Update .NET Core 3.1 to Runtime 3.1.1 and SDK 3.1.101 1789623 - CVE-2020-0602 dotnet: Denial of service via backpressure issue 1789624 - CVE-2020-0603 dotnet: Memory Corruption in SignalR
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-0602 https://access.redhat.com/security/cve/CVE-2020-0603 https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXiCQQ9zjgjWX9erEAQiA5g//U9AGfQhzgzrIja7zNdstcP61hqUbWM+j F2E4FpcJCJgjV3uDli4HsH6sIuzuKV5pVLhvNdbrAMSDJgOaWNJ+Otvmve0yPvY6 KjhAPMQnBjsJE5eUia6ZEIzhvjcHVwVbHQJrqIwLjvBrwHeo6fVWd/IHentdmM+3 FIh6uqClbh434gyq4Oi2MpTJ6G6z0+/siaA/tq4qubWJCtEWLfEXXhWsUL4ye59B edz+0qB0MYi2ZpgJtk0A8RRxtwcVN6KD+SnV2g25XjqwDNBhAfO3AlB1x0Mzo7HQ 2tcWLTpJPtYm8sZFZLOKAGm1hvTJhFnu4Vc5oL7b6paJYsU2Ud9URbakwiiiwzV+ XXLdMmvL63JVeP+cFWkqgI/UR8sdbaXrKFjJcnxNiUklPrrUIx3rq/E1yzCgqwMI M3RakcXDqCsaojoOAy/AMkPH1J2r8vyz08JTLC6Ik54m4Dz7/wGILwuVKXLuR1bM L6oLLZNrc5oxK4VM7Zb0IHaAeK/cOvxQWhglOPkDV4Got721TputjBeIEj8xiHc1 2s5zmndzaUfXm+PoqnFsfGggRErFLXaqwSpRWT2vn2MOXbrEbpPjmJs55tLXABhw 8DI+gmgFRHhE6A4yqvJMzaJGZCsCtUWWXowQEhiCNaymG9Kgx4BkRLNj2Mc15mOK EuYGFNW4Ux4\xadZz -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "2.1" }, { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "3.0" }, { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "3.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "8.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "none" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "eus" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-0603" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ], "trust": 0.8 }, "cve": "CVE-2020-0603", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2020-0603", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2020-16653", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-0603", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-0603", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-16653", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202001-470", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka \u0027ASP.NET Core Remote Code Execution Vulnerability\u0027. Microsoft ASP.NET Core is a cross-platform open source framework from Microsoft Corporation in the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability stems from a program\u0027s inability to handle memory objects. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Critical: .NET Core on Red Hat Enterprise Linux security and bug fix update\nAdvisory ID: RHSA-2020:0134-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:0134\nIssue date: 2020-01-16\nCVE Names: CVE-2020-0602 CVE-2020-0603\n====================================================================\n1. Summary:\n\nAn update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available\nfor .NET Core on Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\n.NET Core is a managed-software framework. It implements a subset of the\n.NET framework APIs and several new APIs, and it includes a CLR\nimplementation. \n\nNew versions of .NET Core that address security vulnerabilities are now\navailable. The updated versions are .NET Core SDK 3.0.102, .NET Core\nRuntime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1. \n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nUsers must rebuild their applications to pick up the fixes. \n\nDefault inclusions for applications built with .NET Core have been updated\nto reference the newest versions and their security fixes. \n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npages listed in the References section. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1787151 - Update .NET Core 3.0 to Runtime 3.0.2 and SDK 3.0.102\n1787174 - Update .NET Core 3.1 to Runtime 3.1.1 and SDK 3.1.101\n1789623 - CVE-2020-0602 dotnet: Denial of service via backpressure issue\n1789624 - CVE-2020-0603 dotnet: Memory Corruption in SignalR\n\n6. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0602\nhttps://access.redhat.com/security/cve/CVE-2020-0603\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nEuYGFNW4Ux4\\xadZz\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "CNNVD", "id": "CNNVD-202001-470" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0603", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2020-001109", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "155981", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-16653", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0186", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-470", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155977", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "id": "VAR-202001-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" } ], "trust": 0.81178882 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" } ] }, "last_update_date": "2023-12-18T13:43:05.651000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2020:0130", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2020:0130" }, { "title": "RHSA-2020:0134", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2020:0134" }, { "title": "CVE-2020-0603 | ASP.NET Core Remote Code Execution Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-0603" }, { "title": "CVE-2020-0603 | ASP.NET Core \u306e\u30ea\u30e2\u30fc\u30c8\u3067\u30b3\u30fc\u30c9\u304c\u5b9f\u884c\u3055\u308c\u308b\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2020-0603" }, { "title": "Patch for Microsoft ASP.NET Core remote code execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/208309" }, { "title": "Microsoft ASP.NET Core Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108468" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "NVD", "id": "CVE-2020-0603" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2020:0130" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2020:0134" }, { "trust": 2.2, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-0603" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0603" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0603" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20200115-ms.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2020/at200001.html" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-0603" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0186/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155981/red-hat-security-advisory-2020-0134-01.html" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-0602" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0602" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-16653" }, { "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "NVD", "id": "CVE-2020-0603" }, { "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-16653" }, { "date": "2020-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "date": "2020-01-16T16:43:31", "db": "PACKETSTORM", "id": "155977" }, { "date": "2020-01-16T16:45:15", "db": "PACKETSTORM", "id": "155981" }, { "date": "2020-01-14T23:15:30.347000", "db": "NVD", "id": "CVE-2020-0603" }, { "date": "2020-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-16653" }, { "date": "2020-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-001109" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-0603" }, { "date": "2020-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-470" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-470" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASP.NET Core Remote code execution vulnerability in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-001109" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-470" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.