RedHat: RHSA-2019-2731:01 Moderate: .NET Core on Red Hat Enterprise Linux

    Date11 Sep 2019
    CategoryRed Hat
    455
    Posted ByLinuxSecurity Advisories
    An update for dotnet is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update
    Advisory ID:       RHSA-2019:2731-01
    Product:           Red Hat Enterprise Linux
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2731
    Issue date:        2019-09-11
    CVE Names:         CVE-2019-1301 
    =====================================================================
    
    1. Summary:
    
    An update for dotnet is now available for Red Hat Enterprise Linux 8.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AppStream (v. 8) - x86_64
    
    3. Description:
    
    NET Core is a managed-software framework. It implements a subset of the
    .NET framework APIs and several new APIs, and it includes a CLR
    implementation.
    
    New versions of .NET Core that address security vulnerabilities are now
    available. The updated versions are .NET Core SDK 2.1.509 and Runtime
    2.1.13.
    
    Security Fix(es):
    
    * dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service
    (CVE-2019-1301)
    
    Default inclusions for applications built with .NET Core have been updated
    to reference the newest versions and their security fixes.
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1750793 - CVE-2019-1301 dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service
    
    6. Package List:
    
    Red Hat Enterprise Linux AppStream (v. 8):
    
    Source:
    dotnet-2.1.509-1.el8_0.src.rpm
    
    x86_64:
    dotnet-2.1.509-1.el8_0.x86_64.rpm
    dotnet-debuginfo-2.1.509-1.el8_0.x86_64.rpm
    dotnet-debugsource-2.1.509-1.el8_0.x86_64.rpm
    dotnet-host-2.1.13-1.el8_0.x86_64.rpm
    dotnet-host-debuginfo-2.1.13-1.el8_0.x86_64.rpm
    dotnet-host-fxr-2.1-2.1.13-1.el8_0.x86_64.rpm
    dotnet-host-fxr-2.1-debuginfo-2.1.13-1.el8_0.x86_64.rpm
    dotnet-runtime-2.1-2.1.13-1.el8_0.x86_64.rpm
    dotnet-runtime-2.1-debuginfo-2.1.13-1.el8_0.x86_64.rpm
    dotnet-sdk-2.1-2.1.509-1.el8_0.x86_64.rpm
    dotnet-sdk-2.1.5xx-2.1.509-1.el8_0.x86_64.rpm
    dotnet-sdk-2.1.5xx-debuginfo-2.1.509-1.el8_0.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-1301
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXXjo0dzjgjWX9erEAQg5Dg//UNFgFvVbZ84VTqElNyhtzid9DvZRjeV1
    kszHZO1Kq2LZ4VKwfXkHD1vNPPAs28Oh0UjohvNDTBM7Vn4VaCKzQHJTwlyGvijh
    kLFoB2qie1TUbPKViZRdpCdcHqACxHIFCceZYp4Gxx3buz2HaZu2hFEXnBQZFboA
    9MUZxFIOqhHeMlz+sOnXrEA3EdEuZbTDNb4MhCv9G4DjTyGkw37haF68vcVKOS5o
    0P5PQnllEuGE6ey/fpJIGcP/83xyY+KJq4AR1qd23xScXfcIH8vq8lzifAK/uSty
    nj4JIQTNXNQQnAALb1rKizJAVfxlCUokAcJF8Z2I6T3FMQD48PeV99Tog2zyyWTu
    PXbrfgLUxWfDjfMvwDQj036cUD9DDs5fs56FKG1WKOMUKdqWAXxq2QwM8XpRRunb
    tU1qQOe7EVuG3a5IQpN6QdVQeR0SAgBlhGj8V0xI8OGg+453UtVQyfKyWJEGPFfv
    lWfIcwMwLbDgEfsEvM2mjuCsKnK0jtjxxzahQRqVbcCFp5WPF0WG3cOeAO4lyYZ0
    rWZ/+I16TSNbVdzfmdkXnx1Te58xMlFDmeQ9QpEb79TVmWLlFdviadLGmMPhl5xJ
    tOaebWo6nq+cDKt78/P02yVT+CQctU8vGQxbtJMrnxIhp1jCjizcRZq4XOH+zFyJ
    9VWPoFS7dhs=
    =mqvK
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.