Action not permitted
Modal body text goes here.
cve-2020-0602
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2020:0130 | Third Party Advisory | |
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2020:0134 | Third Party Advisory | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0130 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0134 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
▼ | Microsoft | ASP.NET Core |
Version: 2.1 Version: 3.0 Version: 3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "name": "RHSA-2020:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ASP.NET Core", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-16T19:06:08", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "name": "RHSA-2020:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0602", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ASP.NET Core", "version": { "version_data": [ { "version_value": "2.1" }, { "version_value": "3.0" }, { "version_value": "3.1" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-0602", "datePublished": "2020-01-14T23:11:20", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-08-04T06:11:04.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-0602\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2020-01-14T23:15:30.287\",\"lastModified\":\"2024-11-21T04:53:50.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de denegaci\u00f3n de servicio cuando ASP.NET Core maneja inapropiadamente las peticiones web, tambi\u00e9n se conoce como \\\"ASP.NET Core Denial of Service Vulnerability\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C3047E-C222-4636-B1B3-722F2C65BC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4319AB8-5013-46B4-8E3C-6FDCFC65FC7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE4072E-3226-435C-BC61-A775D3EF2822\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0130\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0134\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
ghsa-23cv-jh4v-vffm
Vulnerability from github
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
{ "affected": [ { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.All" }, "ranges": [ { "events": [ { "introduced": "2.1.0" }, { "fixed": "2.1.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.1.0" ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "3.0.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.0.0" ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "2.1.0" }, { "fixed": "2.1.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.Http.Connections" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "1.0.15" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.osx-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x86" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-0602" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2022-07-07T23:10:46Z", "nvd_published_at": "2020-01-14T23:15:00Z", "severity": "MODERATE" }, "details": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "id": "GHSA-23cv-jh4v-vffm", "modified": "2022-07-07T23:10:46Z", "published": "2022-05-24T17:06:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602" }, { "type": "WEB", "url": "https://github.com/aspnet/Announcements/issues/402" }, { "type": "WEB", "url": "https://github.com/github/advisory-database/issues/302" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0134" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" } ], "schema_version": "1.4.0", "severity": [], "summary": "Denial of service in ASP.NET Core" }
var-202001-0122
Vulnerability from variot
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'. "Denial of service (DoS) May be in a state. Microsoft ASP.NET Core is a cross-platform open source framework from Microsoft Corporation in the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability stems from the software's incorrect handling of web requests. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Critical: .NET Core on Red Hat Enterprise Linux security and bug fix update Advisory ID: RHSA-2020:0134-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:0134 Issue date: 2020-01-16 CVE Names: CVE-2020-0602 CVE-2020-0603 ==================================================================== 1. Summary:
An update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1.
Security Fixes:
-
dotnet: Memory Corruption in SignalR (CVE-2020-0603)
-
dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)
Users must rebuild their applications to pick up the fixes.
Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1787151 - Update .NET Core 3.0 to Runtime 3.0.2 and SDK 3.0.102 1787174 - Update .NET Core 3.1 to Runtime 3.1.1 and SDK 3.1.101 1789623 - CVE-2020-0602 dotnet: Denial of service via backpressure issue 1789624 - CVE-2020-0603 dotnet: Memory Corruption in SignalR
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet30-dotnet-3.0.102-3.el7.src.rpm
x86_64: rh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm rh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm rh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet31-dotnet-3.1.101-4.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-0602 https://access.redhat.com/security/cve/CVE-2020-0603 https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXiCQQ9zjgjWX9erEAQiA5g//U9AGfQhzgzrIja7zNdstcP61hqUbWM+j F2E4FpcJCJgjV3uDli4HsH6sIuzuKV5pVLhvNdbrAMSDJgOaWNJ+Otvmve0yPvY6 KjhAPMQnBjsJE5eUia6ZEIzhvjcHVwVbHQJrqIwLjvBrwHeo6fVWd/IHentdmM+3 FIh6uqClbh434gyq4Oi2MpTJ6G6z0+/siaA/tq4qubWJCtEWLfEXXhWsUL4ye59B edz+0qB0MYi2ZpgJtk0A8RRxtwcVN6KD+SnV2g25XjqwDNBhAfO3AlB1x0Mzo7HQ 2tcWLTpJPtYm8sZFZLOKAGm1hvTJhFnu4Vc5oL7b6paJYsU2Ud9URbakwiiiwzV+ XXLdMmvL63JVeP+cFWkqgI/UR8sdbaXrKFjJcnxNiUklPrrUIx3rq/E1yzCgqwMI M3RakcXDqCsaojoOAy/AMkPH1J2r8vyz08JTLC6Ik54m4Dz7/wGILwuVKXLuR1bM L6oLLZNrc5oxK4VM7Zb0IHaAeK/cOvxQWhglOPkDV4Got721TputjBeIEj8xiHc1 2s5zmndzaUfXm+PoqnFsfGggRErFLXaqwSpRWT2vn2MOXbrEbpPjmJs55tLXABhw 8DI+gmgFRHhE6A4yqvJMzaJGZCsCtUWWXowQEhiCNaymG9Kgx4BkRLNj2Mc15mOK EuYGFNW4Ux4\xadZz -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "2.1" }, { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "3.0" }, { "model": "asp.net core", "scope": "eq", "trust": 3.0, "vendor": "microsoft", "version": "3.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "8.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "none" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "eus" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:asp.net_core", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-001114" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "CNNVD", "id": "CNNVD-202001-471" } ], "trust": 0.8 }, "cve": "CVE-2020-0602", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-0602", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-16652", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-0602", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-0602", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-0602", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-0602", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-16652", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202001-471", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027. \"Denial of service (DoS) May be in a state. Microsoft ASP.NET Core is a cross-platform open source framework from Microsoft Corporation in the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability stems from the software\u0027s incorrect handling of web requests. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Critical: .NET Core on Red Hat Enterprise Linux security and bug fix update\nAdvisory ID: RHSA-2020:0134-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:0134\nIssue date: 2020-01-16\nCVE Names: CVE-2020-0602 CVE-2020-0603\n====================================================================\n1. Summary:\n\nAn update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available\nfor .NET Core on Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\n.NET Core is a managed-software framework. It implements a subset of the\n.NET framework APIs and several new APIs, and it includes a CLR\nimplementation. The updated versions are .NET Core SDK 3.0.102, .NET Core\nRuntime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1. \n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nUsers must rebuild their applications to pick up the fixes. \n\nDefault inclusions for applications built with .NET Core have been updated\nto reference the newest versions and their security fixes. \n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npages listed in the References section. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1787151 - Update .NET Core 3.0 to Runtime 3.0.2 and SDK 3.0.102\n1787174 - Update .NET Core 3.1 to Runtime 3.1.1 and SDK 3.1.101\n1789623 - CVE-2020-0602 dotnet: Denial of service via backpressure issue\n1789624 - CVE-2020-0603 dotnet: Memory Corruption in SignalR\n\n6. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet30-dotnet-3.0.102-3.el7.src.rpm\n\nx86_64:\nrh-dotnet30-aspnetcore-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-aspnetcore-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-apphost-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-debuginfo-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-host-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-hostfxr-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-runtime-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-sdk-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-targeting-pack-3.0-3.0.2-3.el7.x86_64.rpm\nrh-dotnet30-dotnet-templates-3.0-3.0.102-3.el7.x86_64.rpm\nrh-dotnet30-netstandard-targeting-pack-2.1-3.0.102-3.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.101-4.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.1-4.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.101-4.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.101-4.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0602\nhttps://access.redhat.com/security/cve/CVE-2020-0603\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nEuYGFNW4Ux4\\xadZz\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-0602" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0602", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2020-001114", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "155981", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-16652", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0186", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-471", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155977", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "id": "VAR-202001-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" } ], "trust": 0.79172932 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" } ] }, "last_update_date": "2024-11-23T22:33:37.607000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2020:0130", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "title": "RHSA-2020:0134", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2020:0134" }, { "title": "CVE-2020-0602 | ASP.NET Core Denial of Service Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "title": "CVE-2020-0602 | ASP.NET Core \u306e\u30b5\u30fc\u30d3\u30b9\u62d2\u5426\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2020-0602" }, { "title": "Patch for Microsoft ASP.NET Core Denial of Service Vulnerability (CNVD-2020-16652)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/208311" }, { "title": "Microsoft ASP.NET Core Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108469" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "CNNVD", "id": "CNNVD-202001-471" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-400", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2020:0130" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2020:0134" }, { "trust": 2.2, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-0602" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0602" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0602" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20200115-ms.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2020/at200001.html" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-0602" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0186/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155981/red-hat-security-advisory-2020-0134-01.html" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-0603" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0603" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-16652" }, { "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "db": "PACKETSTORM", "id": "155977" }, { "db": "PACKETSTORM", "id": "155981" }, { "db": "CNNVD", "id": "CNNVD-202001-471" }, { "db": "NVD", "id": "CVE-2020-0602" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-16652" }, { "date": "2020-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "date": "2020-01-16T16:43:31", "db": "PACKETSTORM", "id": "155977" }, { "date": "2020-01-16T16:45:15", "db": "PACKETSTORM", "id": "155981" }, { "date": "2020-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-471" }, { "date": "2020-01-14T23:15:30.287000", "db": "NVD", "id": "CVE-2020-0602" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2020-16652" }, { "date": "2020-01-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-001114" }, { "date": "2020-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-471" }, { "date": "2024-11-21T04:53:50.220000", "db": "NVD", "id": "CVE-2020-0602" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-471" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASP.NET Core Denial of service in Japan (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-001114" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-471" } ], "trust": 0.6 } }
rhsa-2020_0130
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dotnet3.0 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102 and .NET Core Runtime 3.0.2.\n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0130", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1788171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788171" }, { "category": "external", "summary": "1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0130.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update", "tracking": { "current_release_date": "2024-11-22T14:20:51+00:00", "generator": { "date": "2024-11-22T14:20:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:0130", "initial_release_date": "2020-01-16T15:04:43+00:00", "revision_history": [ { "date": "2020-01-16T15:04:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-16T15:04:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:20:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-runtime-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.0@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-targeting-pack-3.0@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-templates-3.0@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product": { "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product_id": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0-debugsource@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product": { "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_id": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.0-debuginfo@3.0.2-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.0-debuginfo@3.0.102-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product": { "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_id": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0-debuginfo@3.0.102-2.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dotnet3.0-0:3.0.102-2.el8_1.src", "product": { "name": "dotnet3.0-0:3.0.102-2.el8_1.src", "product_id": "dotnet3.0-0:3.0.102-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.0@3.0.102-2.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-host-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64" }, "product_reference": "dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-0:3.0.102-2.el8_1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src" }, "product_reference": "dotnet3.0-0:3.0.102-2.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" }, "product_reference": "netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0602", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789623" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in ASP.NET Core. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted requests to an ASP.NET Core application. The highest threat from this flaw is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Denial of service via backpressure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0602" }, { "category": "external", "summary": "RHBZ#1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/402", "url": "https://github.com/aspnet/Announcements/issues/402" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T15:04:43+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0130" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: Denial of service via backpressure issue" }, { "cve": "CVE-2020-0603", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789624" } ], "notes": [ { "category": "description", "text": "A memory corruption flaw was found in ASP.NET core. A client can write to freed memory on the server which could result in undefined behavior. An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code by sending specially crafted requests to an ASP.NET Core application.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Memory Corruption in SignalR", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0603" }, { "category": "external", "summary": "RHBZ#1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/403", "url": "https://github.com/aspnet/Announcements/issues/403" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T15:04:43+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0130" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-apphost-pack-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-hostfxr-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-runtime-3.0-debuginfo-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-sdk-3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-targeting-pack-3.0-0:3.0.2-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet-templates-3.0-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-0:3.0.102-2.el8_1.src", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debuginfo-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:dotnet3.0-debugsource-0:3.0.102-2.el8_1.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.0.102-2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dotnet: Memory Corruption in SignalR" } ] }
rhsa-2020_0134
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-dotnet30-dotnet and rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1.\n\nSecurity Fixes:\n\n* dotnet: Memory Corruption in SignalR (CVE-2020-0603)\n\n* dotnet: SignalR Denial of Service via backpressure issue (CVE-2020-0602)\n\nUsers must rebuild their applications to pick up the fixes.\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0134", "url": "https://access.redhat.com/errata/RHSA-2020:0134" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1787151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787151" }, { "category": "external", "summary": "1787174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787174" }, { "category": "external", "summary": "1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0134.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update", "tracking": { "current_release_date": "2024-11-22T14:20:58+00:00", "generator": { "date": "2024-11-22T14:20:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:0134", "initial_release_date": "2020-01-16T16:33:46+00:00", "revision_history": [ { "date": "2020-01-16T16:33:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-16T16:33:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:20:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-runtime-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-targeting-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-apphost-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-host@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-hostfxr-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-runtime-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-sdk-3.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-targeting-pack-3.1@3.1.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-templates-3.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-netstandard-targeting-pack-2.1@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product_id": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-debuginfo@3.1.101-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-aspnetcore-runtime-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-aspnetcore-targeting-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-apphost-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-host@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-hostfxr-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-runtime-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-sdk-3.0@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-targeting-pack-3.0@3.0.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-templates-3.0@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-netstandard-targeting-pack-2.1@3.0.102-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product_id": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet-debuginfo@3.0.102-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product_id": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.101-4.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product_id": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet30-dotnet@3.0.102-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64" }, "product_reference": "rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0602", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789623" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in ASP.NET Core. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted requests to an ASP.NET Core application. The highest threat from this flaw is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Denial of service via backpressure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0602" }, { "category": "external", "summary": "RHBZ#1789623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0602" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/402", "url": "https://github.com/aspnet/Announcements/issues/402" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T16:33:46+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: Denial of service via backpressure issue" }, { "cve": "CVE-2020-0603", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789624" } ], "notes": [ { "category": "description", "text": "A memory corruption flaw was found in ASP.NET core. A client can write to freed memory on the server which could result in undefined behavior. An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code by sending specially crafted requests to an ASP.NET Core application.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: Memory Corruption in SignalR", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0603" }, { "category": "external", "summary": "RHBZ#1789624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0603" }, { "category": "external", "summary": "https://github.com/aspnet/Announcements/issues/403", "url": "https://github.com/aspnet/Announcements/issues/403" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-01-16T16:33:46+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Server-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-aspnetcore-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.src", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-apphost-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-debuginfo-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-host-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-hostfxr-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-runtime-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-sdk-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-targeting-pack-3.0-0:3.0.2-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-dotnet-templates-3.0-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.0:rh-dotnet30-netstandard-targeting-pack-2.1-0:3.0.102-3.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.1-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.101-4.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.101-4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dotnet: Memory Corruption in SignalR" } ] }
gsd-2020-0602
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-0602", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "id": "GSD-2020-0602", "references": [ "https://access.redhat.com/errata/RHSA-2020:0134", "https://access.redhat.com/errata/RHSA-2020:0130", "https://linux.oracle.com/cve/CVE-2020-0602.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-0602" ], "details": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "id": "GSD-2020-0602", "modified": "2023-12-13T01:21:44.913832Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0602", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ASP.NET Core", "version": { "version_data": [ { "version_value": "2.1" }, { "version_value": "3.0" }, { "version_value": "3.1" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.1],[3.0,3.1]", "affected_versions": "Version 2.1, all versions starting from 3.0 up to 3.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-07-21", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "CVE-2020-0602" ], "not_impacted": "All versions before 2.1, all versions after 2.1 before 3.0, all versions after 3.1", "package_slug": "nuget/Microsoft.AspNetCore.All", "pubdate": "2020-01-14", "solution": "Upgrade to version 3.1.1 or above.", "title": "Improper Input Validation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134" ], "uuid": "1afed33d-088f-49bc-b963-f3d413c7df0f" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "476f10be-63a5-4750-8057-88cecddb6a78" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "49521b09-9dc8-46c3-9718-b4f984007807" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "24c358f0-5e73-46c7-92bf-a4a07f05528c" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "aad59849-81ed-4f55-89db-391de2b869a1" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.osx-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "c3db39d9-7fce-4334-98bb-84148f0da829" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "93ab34ab-0eb5-4f88-805f-f7398bf0b56d" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "ab7ca749-b797-47e3-976d-ba0d54a89049" }, { "affected_range": "[3.1.0,3.1.1)", "affected_versions": "All versions starting from 3.1.0 before 3.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-28", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.1", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x86", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.1 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "14703f47-a3fc-4a8d-8b59-d7da30a899a0" }, { "affected_range": "[2.1.0,2.1.15),[3.0.0,3.1.0]", "affected_versions": "All versions starting from 2.1.0 before 2.1.15, all versions starting from 3.0.0 up to 3.1.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-07-07", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "3.1.1", "2.1.15" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 2.1.0, all versions starting from 2.1.15 before 3.0.0, all versions after 3.1.0", "package_slug": "nuget/Microsoft.AspNetCore.App", "pubdate": "2022-05-24", "solution": "Upgrade to versions 3.1.1, 2.1.15 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "d55fc163-f37f-4a0e-ac8e-3732e311ab3a" }, { "affected_range": "[1.0.0,1.0.15)", "affected_versions": "All versions starting from 1.0.0 before 1.0.15", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-07-07", "description": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027.", "fixed_versions": [ "1.0.15" ], "identifier": "CVE-2020-0602", "identifiers": [ "GHSA-23cv-jh4v-vffm", "CVE-2020-0602" ], "not_impacted": "All versions before 1.0.0, all versions starting from 1.0.15", "package_slug": "nuget/Microsoft.AspNetCore.Http.Connections", "pubdate": "2022-05-24", "solution": "Upgrade to version 1.0.15 or above.", "title": "Denial of service in ASP.NET Core", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-0602", "https://access.redhat.com/errata/RHSA-2020:0130", "https://access.redhat.com/errata/RHSA-2020:0134", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602", "https://github.com/aspnet/Announcements/issues/402", "https://github.com/github/advisory-database/issues/302", "https://github.com/advisories/GHSA-23cv-jh4v-vffm" ], "uuid": "ce93cad2-ec23-4498-8ab7-763bd4eda768" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0602" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka \u0027ASP.NET Core Denial of Service Vulnerability\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "N/A", "refsource": "N/A", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602" }, { "name": "RHSA-2020:0130", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0130" }, { "name": "RHSA-2020:0134", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0134" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-07-21T11:39Z", "publishedDate": "2020-01-14T23:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.