Пакет dotnet-runtime-7.0: Информация

    Исходный пакет: dotnet-runtime-7.0
    Версия: 7.0.14-alt1
    Собран:  1 марта 2024 г. 13:30 в задании #341218
    Сообщить об ошибке в пакете
    Домашняя страница: https://github.com/dotnet/runtime

    Лицензия: MIT
    О пакете: Microsoft .NET Runtime and Microsoft.NETCore.App
    Описание: 
    This package contains the .NET Core runtime, called CoreCLR,
    and the base library, called mscorlib.
    
    .NET is a development platform that you can use to build command-line
    applications, microservices and modern websites. It is open source,
    cross-platform and is supported by Microsoft. We hope you enjoy using it!
    If you do, please consider joining the active community of developers that are
    contributing to the project on GitHub (https://github.com/dotnet/core).

    Список rpm-пакетов, предоставляемых данным srpm-пакетом:
    dotnet-7.0 (x86_64, aarch64)
    dotnet-apphost-pack-7.0 (x86_64, aarch64)
    dotnet-host (x86_64, aarch64)
    dotnet-hostfxr-7.0 (x86_64, aarch64)
    dotnet-runtime-7.0 (x86_64, aarch64)

    Сопровождающий: Vitaly Lipatov

    Список участников:
    Vitaly Lipatov

      1. /proc
      2. clang
      3. cmake >= 3.14.5
      4. dotnet-bootstrap-sdk-7.0 = 7.0.114
      5. libcurl-devel
      6. rpm-macros-dotnet
      7. rpm-macros-features >= 0.6
      8. libicu-devel
      9. libkrb5-devel
      10. liblttng-ust-devel
      11. liblwp-devel
      12. libssl-devel
      13. libstdc++-devel
      14. zlib-devel
      15. libunwind-devel >= 1.5
      16. libuuid-devel
      17. llvm
      18. python3 >= 3.7.1

    Последнее изменение


    9 января 2024 г. Vitaly Lipatov 7.0.14-alt1
    - .NET 7.0.14
    - CVE-2023-36049: .NET Elevation of Privilege Vulnerability
    - CVE-2023-36558: .NET Security Feature Bypass Vulnerability
    - CVE-2023-36792: .NET Remote Code Execution Vulnerability
    - CVE-2023-36793: .NET Remote Code Execution Vulnerability
    - CVE-2023-36794: .NET Remote Code Execution Vulnerability
    - CVE-2023-36796: .NET Remote Code Execution Vulnerability
    - CVE-2023-36799: .NET Denial of Service Vulnerability
    - CVE-2023-44487: .NET Denial of Service Vulnerability
    - CVE-2023-38171: .NET Denial of Service Vulnerability
    - CVE-2023-36435: .NET Denial of Service Vulnerability
    - CVE-2023-44487: .NET Denial of Service Vulnerability
    - CVE-2023-38171: .NET Denial of Service Vulnerability
    - CVE-2023-36435: .NET Denial of Service Vulnerability
    - CVE-2023-38178: .NET Denial of Service Vulnerability
    - CVE-2023-35390: .NET Remote Code Execution Vulnerability
    - CVE-2023-38180: .NET Denial of Service Vulnerability
    - CVE-2023-35391: .NET Information Disclosure Vulnerability
    28 июля 2023 г. Vitaly Lipatov 7.0.9-alt1
    - .NET 7.0.9
    - CVE-2023-33127: .NET Remote Code Execution Vulnerability
    - CVE-2023-33170: .NET Security Feature Bypass Vulnerability
    - CVE-2023-24895: .NET Remote Code Execution Vulnerability
    - CVE-2023-24897: .NET Remote Code Execution Vulnerability
    - CVE-2023-24936: .NET Elevation of Privilege Vulnerability
    - CVE-2023-29331: .NET Denial of Service Vulnerability
    - CVE-2023-29337: NuGet Client Remote Code Execution Vulnerability
    - CVE-2023-32032: .NET Denial of Service Vulnerability
    - CVE-2023-33126: .NET Denial of Service Vulnerability
    - CVE-2023-33128: .NET Denial of Service Vulnerability
    - CVE-2023-33135: .NET Denial of Service Vulnerability
    - CVE-2023-28260: .NET Remote Code Execution Vulnerability
    13 марта 2023 г. Vitaly Lipatov 7.0.3-alt1
    - .NET 7.0.3
    - CVE-2023-21808: .NET Remote Code Execution Vulnerability
    - restore build and pack singlefilehost