ALT-BU-2018-3088-1
Branch sisyphus update bulletin.
Package dotnet-common updated to version 2.0.5-alt1 for branch sisyphus in task 200362.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0764
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
Modified: 2024-11-21
CVE-2018-0786
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
Package dotnet-coreclr updated to version 2.0.5-alt1 for branch sisyphus in task 200362.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0764
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
Modified: 2024-11-21
CVE-2018-0786
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
Package dotnet-corefx updated to version 2.0.5-alt1 for branch sisyphus in task 200362.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0764
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
Modified: 2024-11-21
CVE-2018-0786
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
Package dotnet-sdk updated to version 2.0.5-alt1 for branch sisyphus in task 200362.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0764
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
- http://www.securityfocus.com/bid/102387
- http://www.securitytracker.com/id/1040152
- https://access.redhat.com/errata/RHSA-2018:0379
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764
Modified: 2024-11-21
CVE-2018-0786
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
- http://www.securityfocus.com/bid/102380
- http://www.securitytracker.com/id/1040152
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786
Closed bugs
Удалить зависимость на webclient?