Пакет dotnet-runtime-7.0: Информация
Исходный пакет: dotnet-runtime-7.0
Версия: 7.0.17-alt1
Собран: 6 апреля 2024 г. 2:26 в задании #344471
Категория: Разработка/Прочее
Сообщить об ошибке в пакетеОшибки пересборки | ||
---|---|---|
Архитектура | Дата ошибки | Обновлено |
x86_64 | 18 апреля 2024 г. | 1 июня 2024 г. |
Домашняя страница: https://github.com/dotnet/runtime
Лицензия: MIT
О пакете: Microsoft .NET Runtime and Microsoft.NETCore.App
Описание:
This package contains the .NET Core runtime, called CoreCLR, and the base library, called mscorlib. .NET is a development platform that you can use to build command-line applications, microservices and modern websites. It is open source, cross-platform and is supported by Microsoft. We hope you enjoy using it! If you do, please consider joining the active community of developers that are contributing to the project on GitHub (https://github.com/dotnet/core).
Список rpm-пакетов, предоставляемых данным srpm-пакетом:
dotnet-7.0 (x86_64, aarch64)
dotnet-apphost-pack-7.0 (x86_64, aarch64)
dotnet-host (x86_64, aarch64)
dotnet-hostfxr-7.0 (x86_64, aarch64)
dotnet-runtime-7.0 (x86_64, aarch64)
dotnet-7.0 (x86_64, aarch64)
dotnet-apphost-pack-7.0 (x86_64, aarch64)
dotnet-host (x86_64, aarch64)
dotnet-hostfxr-7.0 (x86_64, aarch64)
dotnet-runtime-7.0 (x86_64, aarch64)
Сопровождающий: Vitaly Lipatov
Последнее изменение
5 апреля 2024 г. Vitaly Lipatov 7.0.17-alt1
- new version (7.0.17) with rpmgs script - CVE-2024-0056: Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data provider Information Disclosure Vulnerability - CVE-2024-0057: .NET Security Feature bypass Vulnerability - CVE-2024-21319: .NET Denial of Service Vulnerability - CVE-2024-21386: .NET Denial of Service Vulnerability - CVE-2024-21404: .NET Denial of Service Vulnerability - CVE-2024-21392: .NET Denial of Service Vulnerability - CVE-2024-26190: Microsoft QUIC Denial of Service Vulnerability
9 января 2024 г. Vitaly Lipatov 7.0.14-alt1
- .NET 7.0.14 - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-38178: .NET Denial of Service Vulnerability - CVE-2023-35390: .NET Remote Code Execution Vulnerability - CVE-2023-38180: .NET Denial of Service Vulnerability - CVE-2023-35391: .NET Information Disclosure Vulnerability
28 июля 2023 г. Vitaly Lipatov 7.0.9-alt1
- .NET 7.0.9 - CVE-2023-33127: .NET Remote Code Execution Vulnerability - CVE-2023-33170: .NET Security Feature Bypass Vulnerability - CVE-2023-24895: .NET Remote Code Execution Vulnerability - CVE-2023-24897: .NET Remote Code Execution Vulnerability - CVE-2023-24936: .NET Elevation of Privilege Vulnerability - CVE-2023-29331: .NET Denial of Service Vulnerability - CVE-2023-29337: NuGet Client Remote Code Execution Vulnerability - CVE-2023-32032: .NET Denial of Service Vulnerability - CVE-2023-33126: .NET Denial of Service Vulnerability - CVE-2023-33128: .NET Denial of Service Vulnerability - CVE-2023-33135: .NET Denial of Service Vulnerability - CVE-2023-28260: .NET Remote Code Execution Vulnerability