Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:1547 - Security Advisory
Issued:
2021-05-12
Updated:
2021-05-12

RHSA-2021:1547 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.115 and .NET Core Runtime 3.1.15.

Security Fix(es):

  • dotnet: .NET Core single-file application privilege escalation (CVE-2021-31204)

In order for the update to be complete, self-contained applications deployed using previous versions need to be recompiled and redeployed.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • dotNET on RHEL (for RHEL Server) 1 x86_64
  • dotNET on RHEL (for RHEL Workstation) 1 x86_64
  • dotNET on RHEL (for RHEL Compute Node) 1 x86_64

Fixes

  • BZ - 1956815 - CVE-2021-31204 dotnet: .NET Core single-file application privilege escalation

CVEs

  • CVE-2021-31204

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

dotNET on RHEL (for RHEL Server) 1

SRPM
rh-dotnet31-dotnet-3.1.115-1.el7_9.src.rpm SHA-256: 144903679c72240af55f22ac305ef4b6055e13bf219e1d8d74d074c8622028c4
x86_64
rh-dotnet31-aspnetcore-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: fa2c8553e4af6d5440681fb0f7e80afbdd91a83010e1921bafe5b8b439ba0454
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 733af8dedc5e5378dd716ea899e7df4e0362fa7eebbaebe7dde48655b96c751a
rh-dotnet31-dotnet-3.1.115-1.el7_9.x86_64.rpm SHA-256: 55c49b28696720f412ffb294bc7be2660e736ee19f6e22d3af7d49e32d9f9b44
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 16e743f6e1cbb25dbe3b8530a2abed6e36c22a07212830137178925b70aae591
rh-dotnet31-dotnet-debuginfo-3.1.115-1.el7_9.x86_64.rpm SHA-256: 145d92cb1ae1d207ad8332ae7f1dd8bc9b63c451fd88922a89419a5e210787f3
rh-dotnet31-dotnet-host-3.1.15-1.el7_9.x86_64.rpm SHA-256: b2bb8f94d924bead10143f821f294b309e95dd5c7de97cb21e402b6cf8e9bbcc
rh-dotnet31-dotnet-hostfxr-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: dd2a7d284c8b3e801a75f57275357b78b7717c7f7d06e2a3dc707463949d2c4c
rh-dotnet31-dotnet-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 457d5b87f70622d06480cc71c05c2c685a2a82391c7d20a754528e94ba9b92bb
rh-dotnet31-dotnet-sdk-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: afa60898d0c6b9b25e76cbdffd3df8f7835aab86fe8bc627c83db4a6299d984e
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 21a5dab2771b8a5687632b0d49d0f900d669cc7f736e4d98ff05c1bb52b2385f
rh-dotnet31-dotnet-templates-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 8885535d2ec04948693f06da456bedb155f5e23161b68c999c7adbeb551243e4
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 1cf21906eb10d37196fe09d06a4e8a809ec40f18360eb6953a82396af50e2994

dotNET on RHEL (for RHEL Workstation) 1

SRPM
rh-dotnet31-dotnet-3.1.115-1.el7_9.src.rpm SHA-256: 144903679c72240af55f22ac305ef4b6055e13bf219e1d8d74d074c8622028c4
x86_64
rh-dotnet31-aspnetcore-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: fa2c8553e4af6d5440681fb0f7e80afbdd91a83010e1921bafe5b8b439ba0454
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 733af8dedc5e5378dd716ea899e7df4e0362fa7eebbaebe7dde48655b96c751a
rh-dotnet31-dotnet-3.1.115-1.el7_9.x86_64.rpm SHA-256: 55c49b28696720f412ffb294bc7be2660e736ee19f6e22d3af7d49e32d9f9b44
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 16e743f6e1cbb25dbe3b8530a2abed6e36c22a07212830137178925b70aae591
rh-dotnet31-dotnet-debuginfo-3.1.115-1.el7_9.x86_64.rpm SHA-256: 145d92cb1ae1d207ad8332ae7f1dd8bc9b63c451fd88922a89419a5e210787f3
rh-dotnet31-dotnet-host-3.1.15-1.el7_9.x86_64.rpm SHA-256: b2bb8f94d924bead10143f821f294b309e95dd5c7de97cb21e402b6cf8e9bbcc
rh-dotnet31-dotnet-hostfxr-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: dd2a7d284c8b3e801a75f57275357b78b7717c7f7d06e2a3dc707463949d2c4c
rh-dotnet31-dotnet-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 457d5b87f70622d06480cc71c05c2c685a2a82391c7d20a754528e94ba9b92bb
rh-dotnet31-dotnet-sdk-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: afa60898d0c6b9b25e76cbdffd3df8f7835aab86fe8bc627c83db4a6299d984e
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 21a5dab2771b8a5687632b0d49d0f900d669cc7f736e4d98ff05c1bb52b2385f
rh-dotnet31-dotnet-templates-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 8885535d2ec04948693f06da456bedb155f5e23161b68c999c7adbeb551243e4
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 1cf21906eb10d37196fe09d06a4e8a809ec40f18360eb6953a82396af50e2994

dotNET on RHEL (for RHEL Compute Node) 1

SRPM
rh-dotnet31-dotnet-3.1.115-1.el7_9.src.rpm SHA-256: 144903679c72240af55f22ac305ef4b6055e13bf219e1d8d74d074c8622028c4
x86_64
rh-dotnet31-aspnetcore-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: fa2c8553e4af6d5440681fb0f7e80afbdd91a83010e1921bafe5b8b439ba0454
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 733af8dedc5e5378dd716ea899e7df4e0362fa7eebbaebe7dde48655b96c751a
rh-dotnet31-dotnet-3.1.115-1.el7_9.x86_64.rpm SHA-256: 55c49b28696720f412ffb294bc7be2660e736ee19f6e22d3af7d49e32d9f9b44
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 16e743f6e1cbb25dbe3b8530a2abed6e36c22a07212830137178925b70aae591
rh-dotnet31-dotnet-debuginfo-3.1.115-1.el7_9.x86_64.rpm SHA-256: 145d92cb1ae1d207ad8332ae7f1dd8bc9b63c451fd88922a89419a5e210787f3
rh-dotnet31-dotnet-host-3.1.15-1.el7_9.x86_64.rpm SHA-256: b2bb8f94d924bead10143f821f294b309e95dd5c7de97cb21e402b6cf8e9bbcc
rh-dotnet31-dotnet-hostfxr-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: dd2a7d284c8b3e801a75f57275357b78b7717c7f7d06e2a3dc707463949d2c4c
rh-dotnet31-dotnet-runtime-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 457d5b87f70622d06480cc71c05c2c685a2a82391c7d20a754528e94ba9b92bb
rh-dotnet31-dotnet-sdk-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: afa60898d0c6b9b25e76cbdffd3df8f7835aab86fe8bc627c83db4a6299d984e
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.15-1.el7_9.x86_64.rpm SHA-256: 21a5dab2771b8a5687632b0d49d0f900d669cc7f736e4d98ff05c1bb52b2385f
rh-dotnet31-dotnet-templates-3.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 8885535d2ec04948693f06da456bedb155f5e23161b68c999c7adbeb551243e4
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.115-1.el7_9.x86_64.rpm SHA-256: 1cf21906eb10d37196fe09d06a4e8a809ec40f18360eb6953a82396af50e2994

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility