sidebar hamburger menu

Endless Lifecycle Support for Languages

ELS for PHP

Endless Lifecycle Support (ELS) for PHP from TuxCare provides security fixes for PHP versions that have reached their end-of-life. This allows to continue running Linux server vulnerability-free.

Supported OS

TuxCare provides Endless Lifecycle Support through four years after the EOL date.

OSVersion
CentOS, CloudLinux, OracleLinux, etc.6.x 64-bit, 7.x 64-bit, 8.x 64-bit, 9.x 64-bit
AlmaLinux8.x 64-bit, 9.x 64-bit
Ubuntu16.04 64-bit, 18.04 64-bit, 20.04 64-bit, 22.04 64-bit
Debian10, 11, 12
Other linux distros upon request.

Supported versions

CentOS, CloudLinux, AlmaLinux, Oracle Linux, etc.: 5.1.6, 5.2.17, 5.3.29, 5.4.45, 5.5.38, 5.6.40, 7.0.33, 7.1.33, 7.2.34, 7.3.33, 7.4.33, 8.0.30, 8.1.27, 8.2, 8.3

Ubuntu: 5.6.40, 7.0.33, 7.1.33, 7.2.34, 7.3.33, 7.4.33, 8.0.30, 8.1.27, 8.2, 8.3 Debian: 10, 11, 12

Vulnerability Coverage and Target Response Times

TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.

Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.

TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:

  • High and Critical CVEs (CVSS 7+): Patches provided within 14 days
  • Medium-severity CVEs (CVSS 4.0 to 6.9): Patches provided within 60 days
  • Low-severity CVEs: Patches provided within 90 days
  • TuxCare may offer a mitigation strategy as an alternative to a direct code fix.

Installation instructions of yum repositories

RHEL based systems

  1. Download an installer script:
wget https://repo.cloudlinux.com/php-els/install-php-els-repo.sh
  1. Run the installer script with keys. The installation script registers the server in the CLN with the key, adds the yum repository, and adds a PGP key to the server.
sh install-php-els-repo.sh --license-key XXX-XXXXXXXXXXXX
  1. Verify that the installation was successful.

To ensure the installation has been completed successfully, run the following command. It should return the info about an available package. If information about the package will be available, it would mean that installation was successful. After that, updates will be available for installation from the repository using the usual yum upgrade command.

yum info alt-php73

Available Packages
Name        : alt-php73
Arch        : x86_64
Epoch       : 1
Version     : 7.3.33
Release     : 5.2.el7
Size        : 22 k
Repo        : php-els/7
Summary     : PHP scripting language for creating dynamic web sites
URL         : http://www.php.net/
License     : PHP and LGPLv2 and LGPLv2+
Description : PHP is an HTML-embedded scripting language.

How to install packages:

  • Each version of PHP individually or all versions at once can be installed.
  • Standard commands to install each version separately can be used. For example, installing alt-php73:
yum install alt-php73*

To install all versions at the same time, use group:

yum groupinstall alt-php

Ubuntu

Download an installer script:

wget https://repo.cloudlinux.com/php-els/install-php-els-ubuntu-repo.sh

Run the installer script with keys:

bash install-php-els-ubuntu-repo.sh --license-key XXX-XXXXXXXXXXXX

To ensure the installation has been completed successfully, run the following command. It should return the info about an available package. If information about the package will be available, it would mean that installation was successful. After that, updates will be available for installation from the repository using the usual apt upgrade command.

apt-cache show alt-php73-cli

Package: alt-php73-cli
Source: php
Version: 7.3.18-1
Architecture: amd64
Maintainer: Sergey Fokin <sfokin@cloudlinux.com>
Installed-Size: 51694
Depends: libbz2-1.0, libc6 (>= 2.14), libcurl3 (>= 7.44.0), libgmp10, libreadline6 (>= 6.0), libssl1.0.0 (>= 1.0.2~beta3), libsystemd0, libxml2 (>= 2.9.0), zlib1g (>= 1:1.1.4), alt-php73-common (= 7.3.18-1), libcurl4-openssl-dev, libnghttp2-14
Homepage: http://www.php.net/
Priority: optional
Section: libs
Filename: pool/main/p/php/alt-php73-cli_7.3.18-1_amd64.deb
Size: 10247916
SHA256: 6f107e60684695b6261871a5540c4742eb6e86befe767ab313d1eacda023e5bb
SHA1: e8e7d6ab06470cbda5f5ef65a48c7c527ff52e9b
MD5sum: d6c664d4f4b229c1e6727804888f6079
Description: command-line interpreter for the PHP scripting language.
Description-md5: 0d83f7bf7177d3376a59b73890c8494d

How to install packages:

  • Each version of PHP individually or all versions at once can be installed.
  • Standard commands to install each version separately can be used. For example, installing alt-php73:
apt-get install alt-php73*

To install all versions at the same time, it is necessary to use the alt-php meta-package:

apt-get install alt-php

OVAL data

Introduction

This section contains information about available ELS for PHP OVAL streams that can be used for partner application integration.

Currently, we provide OVAL data for the following OS versions:

  • EL 6 (CentOS, CloudLinux, OracleLinux, etc.)
  • EL 7 (CentOS, CloudLinux, OracleLinux, etc.)
  • EL 8 (AlmaLinux, CentOS, CloudLinux, OracleLinux, etc.)
  • EL 9 (AlmaLinux, CentOS, CloudLinux, etc.)
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 20.04
  • Ubuntu 22.04

TuxCare PHP ELS OVAL Streams

How to use OVAL

  1. Install OpenSCAP
    • for rpm systems:
    yum install openscap openscap-utils scap-security-guide -y
    
    • for deb systems:
    apt-get install libopenscap8 -y
    
  2. Download OVAL stream:
wget https://repo.cloudlinux.com/php-els/centos6-els-php-oval.xml
  1. Run scanning:
oscap oval eval --results result.xml --report report.xml centos6-els-php-oval.xml

PHP extensions list

You can find the list of the supported add-ons here.

How to use PHP-ELS

When you deploy an updated version of PHP through PHP ELS, using your system’s regular update tool (yum, dnf, apt), the new version will be installed under /opt/alt/php[version]/. This means that all modules, configurations and additional files pertaining to this version will be contained inside that path. Different versions of PHP will each have their own path and can coexist without issues on the same system. Below you will find the location of all the relevant files, should you want to make any changes.

The bin files:

[root@localhost ~]# ll /opt/alt/phpXY/usr/bin/
bytekit          hphpa            pear             pecl             phar.phar        phpcb            php-config       phpcpd           phploc           phpunit-skelgen
dbunit           lsphp            peardev          phar             php              php-cgi          phpcov           phpize           phpunit          ppw

Modules and pecl extensions:

ls /opt/alt/phpXY/usr/lib64/php/modules/
ZendGuardLoader.so  imagick.so         oci8.so          stem.so
amqp.so             imap.so            odbc.so          stomp.so
apc.so              inclued.so         opcache.so       suhosin.so
apcu.so             inotify.so         pdf.so           sybase_ct.so
apm.so              interbase.so       pdo.so           sysvmsg.so
ares.so             intl.so            pdo_dblib.so     sysvsem.so
bcmath.so           ioncube_loader.so  pdo_firebird.so  sysvshm.so
big_int.so          ixed.5.4.lin       pdo_mysql.so     tideways.so
bitset.so           jsmin.so           pdo_oci.so       tidy.so
brotli.so           json.so            pdo_odbc.so      timezonedb.so
bz2_filter.so       ldap.so            pdo_pgsql.so     trader.so
dba.so              libevent.so        pdo_sqlite.so    translit.so
dbase.so            libsodium.so       pgsql.so         uploadprogress.so
dbx.so              luasandbox.so      phalcon.so       uri_template.so
dom.so              lzf.so             phar.so          uuid.so
doublemetaphone.so  mailparse.so       posix.so         wddx.so
eaccelerator.so     mbstring.so        propro.so        weakref.so
eio.so              mcrypt.so          pspell.so        xcache.so
enchant.so          memcache.so        quickhash.so     xcache_3.so
fileinfo.so         memcached.so       radius.so        xdebug.so
functional.so       mongo.so           raphf.so         xhprof.so
gd.so               mongodb.so         rar.so           xmlreader.so
gender.so           msgpack.so         recode.so        xmlrpc.so
geoip.so            mssql.so           redis.so         xmlwriter.so
geos.so             mysql.so           rsync.so         xrange.so
gmagick.so          mysqli.so          snmp.so          xsl.so
gnupg.so            mysqlnd.so         soap.so          yaf.so
haru.so             ncurses.so         sockets.so       yaml.so
hidef.so            nd_mysql.so        solr.so          yaz.so
htscanner.so        nd_mysqli.so       spl_types.so     zip.so
http.so             nd_pdo_mysql.so    ssh2.so          zmq.so
igbinary.so         oauth.so           stats.so

Running code on a specific version through the CLI:

[root@localhost ~]# /opt/alt/phpXY/usr/bin/php helloworld.php
Hello, World!

Location of ini config files:

[root@localhost ~]# ls /opt/alt/phpXY/etc/php.d.all/
40-leveldb.ini        mailparse.ini     redis.ini
40-snuffleupagus.ini  mbstring.ini      rrd.ini
40-vld.ini            mcrypt.ini        snmp.ini
amqp.ini              memcache.ini      snuffleupagus-default.rules
apcu.ini              memcached.ini     soap.ini
bcmath.ini            mongodb.ini       sockets.ini
dba.ini               mysqli.ini        sodium.ini
dbase.ini             mysqlnd.ini       solr.ini
dom.ini               nd_mysqli.ini     sourceguardian.ini
eio.ini               nd_pdo_mysql.ini  sqlsrv.ini
enchant.ini           newrelic.ini      ssh2.ini
ffmpeg.ini            oauth.ini         stats.ini
fileinfo.ini          oci8.ini          swoole.ini
gd.ini                odbc.ini          sysvmsg.ini
gearman.ini           opcache.ini       sysvsem.ini
gender.ini            pdf.ini           sysvshm.ini
geoip.ini             pdo.ini           tideways_xhprof.ini
geos.ini              pdo_dblib.ini     tidy.ini
gmagick.ini           pdo_firebird.ini  timezonedb.ini
gnupg.ini             pdo_mysql.ini     trader.ini
grpc.ini              pdo_oci.ini       uploadprogress.ini
http.ini              pdo_odbc.ini      uuid.ini
igbinary.ini          pdo_pgsql.ini     vips.ini
imagick.ini           pdo_sqlite.ini    xdebug.ini
imap.ini              pdo_sqlsrv.ini    xmlreader.ini
inotify.ini           pgsql.ini         xmlrpc.ini
intl.ini              phalcon4.ini      xmlwriter.ini
ioncube_loader.ini    phar.ini          xsl.ini
jsmin.ini             posix.ini         yaml.ini
json.ini              propro.ini        yaz.ini
ldap.ini              pspell.ini        zip.ini
luasandbox.ini        psr.ini           zmq.ini
lzf.ini               raphf.ini

Location of default.ini:

ls /opt/alt/phpXY/etc/php.d/default.ini

Listing enabled modules on a specific version:

[root@localhost ~]# /opt/alt/php73/usr/bin/php -m
[PHP Modules]
bz2
calendar
Core
ctype
curl
date
exif
filter
ftp
gettext
gmp
hash
iconv
libxml
openssl
pcntl
pcre
readline
Reflection
session
shmop
SimpleXML
SPL
sqlite3
standard
tokenizer
xml
zlib
[Zend Modules]

Enabling a module through the CLI:

[root@localhost ~]# /opt/alt/php73/usr/bin/php -d "extension=igbinary.so" -m
[PHP Modules]
bz2
calendar
Core
ctype
curl
date
exif
filter
ftp
gettext
gmp
hash
iconv
igbinary
libxml
openssl
pcntl
pcre
readline
Reflection
session
shmop
SimpleXML
SPL
sqlite3
standard
tokenizer
xml
zlib
[Zend Modules]

As you can see, each version is entirely self-contained, and changing configurations in one will not impact the others, a desired feature in hosting environments.

ELS for Python

Endless Lifecycle Support (ELS) for Python from TuxCare provides security fixes for Python 2.7 version for AlmaLinux 9. This allows to continue running Linux server vulnerability-free.

Installation instructions of yum repositories

  1. Download an installer script:
wget https://repo.cloudlinux.com/python-els/install-python-els-repo.sh
  1. Run the installer script with keys. The installation script registers the server in the CLN with the key, adds a PGP key and adds repository to the server.
sh install-python-els-repo.sh --license-key XXX-XXXXXXXXXXXX
  1. Verify that the installation was successful.

To ensure the installation has been completed successfully, run the following command. It should return the info about an available package. If information about the package will be available, it would mean that installation was successful. After that, updates will be available for installation from the repository using the usual yum upgrade command.

yum info python2

Available Packages
Name         : python2
Version      : 2.7.18
Release      : 10.el9.tuxcare.els1
Architecture : x86_64
Size         : 43 k
Source       : python2-2.7.18-10.el9.tuxcare.els1.src.rpm
Repository   : python-els
Summary      : An interpreted, interactive, object-oriented programming language
URL          : https://www.python.org/
License      : Python
Description  : Python 2 is an old version of the language that is incompatible
             : with the 3.x line of releases.
  1. To install python, it's necessary to enable the CodeReady Builder(CRB) repository, which contains the gdbm package.
yum install python2 --enablerepo crb

Once installed, you can use python2 in the usual way.

$ python2
Python 2.7.18 (default, Jun 30 2022, 00:00:00)
[GCC 11.2.1 20220127 (Red Hat 11.2.1-9)] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> print "Hello, World!"
Hello, World!

Installation instructions of a local mirror

We provide the ability to create local mirrors of Python for ELS updates. To obtain the access to the local mirroring, provide your External IP address to your Account Manager or send it to sales@tuxcare.com.

To create a local mirror of the repository with security updates via rsync, use the following:

rsync://repo.cloudlinux.com/PYTHON_ELS/

Example of creating a local mirror for all supported OS versions:

rsync -avSHP --delete rsync://repo.cloudlinux.com/PYTHON_ELS/ .

OVAL data

Introduction

This section contains information about available ELS for Python OVAL streams that can be used for partner application integration. Currently, we provide OVAL data for AlmaLinux 9.

TuxCare Python ELS OVAL Stream

AlmaLinux 9: https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml.

How to use OVAL

  1. Install OpenSCAP:
yum install openscap openscap-utils scap-security-guide -y
  1. Download OVAL stream:
wget https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml
  1. Run scanning:
oscap oval eval --results result.xml --report report.xml almalinux9-els-python-oval.xml

ELS for Spring Framework and Spring Boot

TuxCare's Endless Lifecycle Support (ELS) for Spring provides security updates, system enhancement patches, and selected bug fixes, that are integral to the stable operation of applications running on these versions of Spring ecosystem components such as Spring Framework, Spring Boot, Spring Data, Spring Security, etc. These components have either reached their end of standard support from vendors or have reached End of Life (EOL).

Our ELS for Spring service is designed to provide solutions for organizations that are not yet ready to migrate to newer versions and that are seeking long-term stability for their legacy Spring applications.

Vulnerability Coverage and Target Response Times

TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.

Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.

TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:

  • High and Critical CVEs (CVSS 7+): Patches provided within 14 days
  • Medium-severity CVEs (CVSS 4.0 to 6.9): Patches provided within 60 days
  • Low-severity CVEs: Patches provided within 90 days
  • TuxCare may offer a mitigation strategy as an alternative to a direct code fix.

Incident Reporting and Response Timeframe

Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal https://tuxcare.com/support-portal/. TuxCarecommits to providing an initial response to any reported issue within 3 days.

Requests for customer-directed security patches for CVEs that are outside of the ELS for Spring scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.

Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.

Enhanced Transparency & Visibility

TuxCare's commitment to transparency and visibility is foundational to our ELS for Spring offering. We provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.

  • SLSA Compliance: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
  • Software Bill of Materials (SBOM): We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
  • Enhanced Metadata in Standard Formats: Each SBOM is provided in universally recognized formats such as SPDX and VEX. These include enhanced metadata like artifact analysis, package health, and vulnerability impact data, ensuring that you have the most detailed and actionable information at your fingertips.
  • Verifiable Integrity and Provenance: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
  • Secure Distribution: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.

Technical Support

TuxCare provides technical support according to the support policy . It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal https://tuxcare.com/support-portal/ and to the TuxCare’s online knowledge base.

Connection to ELS for Spring Repository

Overview

This guide outlines the steps needed to integrate the TuxCare ELS for Spring repository into your Java application. The repository provides trusted Java libraries that can be easily integrated into your Maven as well as Gradle project.

Steps

Step 1: Get user credentials

You need username and password in order to use TuxCare ELS Spring repository. Anonymous access is disabled. To receive username and password please contact sales@tuxcare.com

Step 2: Create or Modify Your Build Tool Settings

Maven

If you are using Maven as your build automation tool, you will need to make changes in your ${MAVEN_HOME}/settings.xml file. If the file does not already exist in your Maven home directory (${MAVEN_HOME}), you should create one. Open the settings.xml file with a text editor and include the following configuration:

    <?xml version="1.0" encoding="UTF-8"?>
    <settings xmlns="http://maven.apache.org/SETTINGS/1.1.0">
        <servers>
            <server>
         	    <id>repository-id</id>
         	    <username>${env.USERNAME}</username>
         	    <password>${env.PASSWORD}</password>
       	</server>
        </servers>
    </settings> 

Set your credentials via the following enviromnent variables:

    export USERNAME=your-username
    export PASSWORD=your-password

Here your-username and your-password are your credentials mentioned in the Step 1 .

You may choose an arbitrary allowed value instead of repository-id and use the same value in the following snippet from your pom.xml file:

    <repositories>
        <repository>
            <id>repository-id</id>
            <url>https://nexus-repo.corp.cloudlinux.com/repository/els_spring/</url>
        </repository>
    </repositories>

An example of maven project you can find here . Do not forget to set the enviromnet variables.

Gradle

If you are using Gradle as your build automation tool, make sure to include the following configuration in your project setup:

    repositories {
      maven {
        url = uri("https://nexus-repo.corp.cloudlinux.com/repository/els_spring")
        credentials {
                username = findProperty('USERNAME')
                password = findProperty('PASSWORD')
        }
      }
    }

Set your credentials via the following enviromnent variables:

    export ORG_GRADLE_PROJECT_USERNAME=your-username
    export ORG_GRADLE_PROJECT_PASSWORD=your-password

Here your-username and your-password are your credentials mentioned in the Step 1 .

An example of gradle project you can find here . Do not forget to set the enviromnet variables.

Verification

To confirm that the repository has been correctly established, include any library from the repository into your project and then run a build. The build tool you're using should be able to identify and resolve dependencies from the TuxCare ELS for Spring repository.

Conclusion

You've successfully integrated the TuxCare ELS for Spring repository into your project. You can now benefit from the secure and vetted Spring libraries it provides.

Resolved CVEs in ELS for Spring

CVE IDSeverityGroupNameVersion
CVE-2012-0881HIGHorg.springframework.securityspring-security-openid5.8.15
CVE-2013-4002HIGHorg.springframework.securityspring-security-openid5.8.15
CVE-2015-6420HIGHorg.apache.velocityvelocity1,7
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2017-1000487CRITICALorg.codehaus.plexusplexus-utils1.5.8
org.springframework.bootspring-boot-maven-plugin2.7.18
CVE-2018-10237MEDIUMcom.google.guavaguava20
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2018-2799MEDIUMorg.springframework.securityspring-security-openid5.8.15
CVE-2019-12400MEDIUMorg.apache.santuarioxmlsec2.0.10
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2020-13936HIGHorg.apache.velocityvelocity1,7
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2020-13956MEDIUMorg.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
CVE-2020-36518HIGHorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.securityspring-security-cas5.8.15
CVE-2020-5397MEDIUMorg.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2020-5398HIGHorg.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2020-5421MEDIUMorg.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2020-8908LOWcom.google.guavaguava20
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.securityspring-security-saml2-service-provider5.8.15
org.springframework.wsspring-ws-security3.1.8
CVE-2021-22060MEDIUMorg.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2021-22096MEDIUMorg.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2021-22118HIGHorg.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2021-40690HIGHorg.apache.santuarioxmlsec2.0.10
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2021-46877HIGHorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.securityspring-security-cas5.8.15
CVE-2022-1471CRITICALorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
org.yamlsnakeyaml1,33
CVE-2022-22950MEDIUMorg.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2022-22968MEDIUMorg.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2022-22970MEDIUMorg.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2022-22971MEDIUMorg.springframework.pluginspring-plugin-core2.0.0.RELEASE
CVE-2022-23437MEDIUMorg.springframework.securityspring-security-openid5.8.15
CVE-2022-24823MEDIUMorg.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.dataspring-data-cassandra3.4.18
CVE-2022-25857HIGHorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-38749MEDIUMorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-38750MEDIUMorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-38751MEDIUMorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-38752MEDIUMorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-40152HIGHorg.apache.santuarioxmlsec2.0.10
org.springframework.securityspring-security-saml2-service-provider5.8.15
CVE-2022-41854MEDIUMorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2022-42003HIGHorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.dataspring-data-cassandra3.4.18
org.springframework.dataspring-data-couchbase4.4.18
org.springframework.securityspring-security-cas5.8.15
CVE-2022-42004HIGHorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.dataspring-data-cassandra3.4.18
org.springframework.dataspring-data-couchbase4.4.18
org.springframework.securityspring-security-cas5.8.15
CVE-2022-4244HIGHorg.codehaus.plexusplexus-utils1.5.8
org.springframework.bootspring-boot-maven-plugin2.7.18
CVE-2022-4245MEDIUMorg.codehaus.plexusplexus-utils1.5.8
org.springframework.bootspring-boot-maven-plugin2.7.18
CVE-2023-1370HIGHorg.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.dataspring-data-rest-core3.7.18
org.springframework.dataspring-data-rest-webmvc3.7.18
org.springframework.hateoasspring-hateoas1.5.6
CVE-2023-1973HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2023-20860HIGHorg.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.wsspring-ws-security3.1.8
CVE-2023-20861MEDIUMorg.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
org.springframework.wsspring-ws-security3.1.8
CVE-2023-20863MEDIUMorg.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.pluginspring-plugin-core2.0.0.RELEASE
org.springframework.wsspring-ws-security3.1.8
CVE-2023-25194HIGHorg.apache.kafkakafka-clients3.2.3
CVE-2023-2976HIGHcom.google.guavaguava20
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.securityspring-security-saml2-service-provider5.8.15
org.springframework.wsspring-ws-security3.1.8
CVE-2023-33201MEDIUMorg.springframework.securityspring-security-cas5.8.15
CVE-2023-33202MEDIUMorg.springframework.securityspring-security-cas5.8.15
CVE-2023-34054HIGHorg.springframework.bootspring-boot-starter-rsocket2.7.18
CVE-2023-34453HIGHorg.apache.kafkakafka-clients3.2.3
org.xerial.snappysnappy-java1.1.8.4
CVE-2023-34454HIGHorg.apache.kafkakafka-clients3.2.3
org.xerial.snappysnappy-java1.1.8.4
CVE-2023-34455HIGHorg.apache.kafkakafka-clients3.2.3
org.xerial.snappysnappy-java1.1.8.4
CVE-2023-34462MEDIUMorg.springframework.securityspring-security-rsocket5.8.15
CVE-2023-35116MEDIUMorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.dataspring-data-cassandra3.4.18
CVE-2023-38286HIGHorg.springframework.bootspring-boot-starter-thymeleaf2.7.18
CVE-2023-4043HIGHorg.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
CVE-2023-43642HIGHorg.apache.kafkakafka-clients3.2.3
org.xerial.snappysnappy-java1.1.8.4
CVE-2023-44483MEDIUMorg.apache.santuarioxmlsec2.0.10
org.springframework.securityspring-security-saml2-service-provider5.8.15
org.springframework.wsspring-ws-security3.1.8
CVE-2023-44487HIGHorg.springframework.securityspring-security-rsocket5.8.15
CVE-2023-46120HIGHorg.springframework.bootspring-boot-starter-amqp2.7.18
CVE-2023-4639CRITICALorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2023-49921MEDIUMorg.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
CVE-2023-52428HIGHorg.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.securityspring-security-oauth2-client5.8.15
org.springframework.securityspring-security-oauth2-jose5.8.15
CVE-2023-5379HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2023-5685HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2023-6378HIGHorg.springframework.bootspring-boot-starter2.7.18
org.springframework.bootspring-boot-starter-activemq2.7.18
org.springframework.bootspring-boot-starter-actuator2.7.18
org.springframework.bootspring-boot-starter-amqp2.7.18
org.springframework.bootspring-boot-starter-aop2.7.18
org.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-batch2.7.18
org.springframework.bootspring-boot-starter-cache2.7.18
org.springframework.bootspring-boot-starter-data-cassandra2.7.18
org.springframework.bootspring-boot-starter-data-cassandra-reactive2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.bootspring-boot-starter-data-jdbc2.7.18
org.springframework.bootspring-boot-starter-data-jpa2.7.18
org.springframework.bootspring-boot-starter-data-ldap2.7.18
org.springframework.bootspring-boot-starter-data-mongodb2.7.18
org.springframework.bootspring-boot-starter-data-mongodb-reactive2.7.18
org.springframework.bootspring-boot-starter-data-neo4j2.7.18
org.springframework.bootspring-boot-starter-data-r2dbc2.7.18
org.springframework.bootspring-boot-starter-data-redis2.7.18
org.springframework.bootspring-boot-starter-data-redis-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-freemarker2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-integration2.7.18
org.springframework.bootspring-boot-starter-jdbc2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-jooq2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-jta-atomikos2.7.18
org.springframework.bootspring-boot-starter-logging2.7.18
org.springframework.bootspring-boot-starter-mail2.7.18
org.springframework.bootspring-boot-starter-mustache2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-quartz2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-thymeleaf2.7.18
org.springframework.bootspring-boot-starter-validation2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
CVE-2023-6481HIGHorg.springframework.bootspring-boot-starter2.7.18
... (all the same sub-starters as above) ...
CVE-2023-7272HIGHorg.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
CVE-2024-1459MEDIUMorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-1635HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-22243HIGHorg.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
org.springframework.dataspring-data-couchbase4.4.18
org.springframework.dataspring-data-rest-core3.7.18
org.springframework.dataspring-data-rest-webmvc3.7.18
org.springframework.hateoasspring-hateoas1.5.6
org.springframework.integrationspring-integration-ws5.5.20
org.springframework.wsspring-ws-core3.1.8
org.springframework.wsspring-ws-security3.1.8
org.springframework.wsspring-ws-support3.1.8
org.springframework.wsspring-ws-test3.1.8
CVE-2024-22257HIGHorg.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.wsspring-ws-security3.1.8
CVE-2024-22262HIGHorg.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-data-rest2.7.18
org.springframework.bootspring-boot-starter-graphql2.7.18
org.springframework.bootspring-boot-starter-groovy-templates2.7.18
org.springframework.bootspring-boot-starter-hateoas2.7.18
org.springframework.bootspring-boot-starter-jersey2.7.18
org.springframework.bootspring-boot-starter-json2.7.18
org.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
org.springframework.bootspring-boot-starter-web2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.bootspring-boot-starter-web-services2.7.18
org.springframework.bootspring-boot-starter-websocket2.7.18
org.springframework.dataspring-data-couchbase4.4.18
org.springframework.dataspring-data-rest-core3.7.18
org.springframework.dataspring-data-rest-webmvc3.7.18
org.springframework.hateoasspring-hateoas1.5.6
org.springframework.integrationspring-integration-ws5.5.20
org.springframework.wsspring-ws-core3.1.8
org.springframework.wsspring-ws-security3.1.8
org.springframework.wsspring-ws-support3.1.8
org.springframework.wsspring-ws-test3.1.8
CVE-2024-23450HIGHorg.springframework.bootspring-boot-starter-data-elasticsearch2.7.18
org.springframework.dataspring-data-elasticsearch4.4.18
CVE-2024-25710MEDIUMorg.springframework.bootspring-boot-antlib2.7.18
org.springframework.bootspring-boot-buildpack-platform2.7.18
org.springframework.bootspring-boot-cli2.7.18
org.springframework.bootspring-boot-gradle-plugin2.7.18
org.springframework.bootspring-boot-loader-tools2.7.18
org.springframework.bootspring-boot-maven-plugin2.7.18
CVE-2024-26308MEDIUMorg.springframework.bootspring-boot-antlib2.7.18
org.springframework.bootspring-boot-buildpack-platform2.7.18
org.springframework.bootspring-boot-cli2.7.18
org.springframework.bootspring-boot-gradle-plugin2.7.18
org.springframework.bootspring-boot-loader-tools2.7.18
org.springframework.bootspring-boot-maven-plugin2.7.18
CVE-2024-29025MEDIUMorg.springframework.bootspring-boot-starter-artemis2.7.18
org.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.bootspring-boot-starter-reactor-netty2.7.18
org.springframework.bootspring-boot-starter-rsocket2.7.18
org.springframework.bootspring-boot-starter-webflux2.7.18
org.springframework.dataspring-data-couchbase4.4.18
CVE-2024-29857HIGHorg.springframework.securityspring-security-cas5.8.15
CVE-2024-30171MEDIUMorg.springframework.securityspring-security-cas5.8.15
CVE-2024-31573CRITICALorg.springframework.wsspring-ws-test3.1.8
org.xmlunitxmlunit-core2.9.0
CVE-2024-34447HIGHorg.springframework.securityspring-security-cas5.8.15
CVE-2024-36124MEDIUMorg.springframework.bootspring-boot-starter-data-couchbase2.7.18
org.springframework.bootspring-boot-starter-data-couchbase-reactive2.7.18
org.springframework.dataspring-data-couchbase4.4.18
CVE-2024-3653MEDIUMorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-38808MEDIUMorg.springframework.batchspring-batch-core4.3.10
org.springframework.bootspring-boot2.7.18
org.springframework.bootspring-boot-actuator2.7.18
org.springframework.bootspring-boot-actuator-autoconfigure2.7.18
org.springframework.bootspring-boot-autoconfigure2.7.18
org.springframework.bootspring-boot-devtools2.7.18
org.springframework.bootspring-boot-properties-migrator2.7.18
org.springframework.bootspring-boot-starter2.7.18
... (all the same sub-starters and Spring Data modules repeated above) ...
CVE-2024-38809HIGHorg.springframework.bootspring-boot-starter-data-couchbase2.7.18
... (similarly repeated modules for data-couchbase, data-rest, etc.)
CVE-2024-38816HIGHorg.springframeworkspring-webflux5.3.39
org.springframeworkspring-webmvc5.3.39
org.springframework.bootspring-boot-starter-data-rest2.7.18
... (and so on for the repeated modules)
CVE-2024-38820MEDIUMorg.springframeworkspring-aop5.3.39
org.springframeworkspring-aspects5.3.39
org.springframeworkspring-beans5.3.39
org.springframeworkspring-context5.3.39
(continues for spring-core, spring-web, spring-webmvc, etc., as listed)
CVE-2024-38821HIGHorg.springframework.bootspring-boot-starter-oauth2-client2.7.18
org.springframework.bootspring-boot-starter-oauth2-resource-server2.7.18
org.springframework.bootspring-boot-starter-security2.7.18
CVE-2024-38829LOWorg.springframework.bootspring-boot-starter-data-ldap2.7.18
CVE-2024-40094HIGHorg.springframework.bootspring-boot-starter-graphql2.7.18
CVE-2024-47535MEDIUMorg.springframework.securityspring-security-rsocket5.8.15
CVE-2024-5971HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-6162HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-6762MEDIUMorg.springframework.bootspring-boot-starter-jetty2.7.18
CVE-2024-7885HIGHorg.springframework.bootspring-boot-starter-undertow2.7.18
CVE-2024-8184MEDIUMorg.springframework.bootspring-boot-starter-jetty2.7.18
CVE-2024-9823MEDIUMorg.springframework.bootspring-boot-starter-jetty2.7.18

Endless Lifecycle Support for .NET 6

Endless Lifecycle Support (ELS) for .NET 6 from TuxCare provides security fixes for .NET 6 that has reached its end of life. This allows you to continue running .NET 6 applications without vulnerability concerns, even after official support has ended.

Supported Windows Versions

OSVersionArchitectures
Nano Server2019, 2022x64
Windows11 (24H2 (IoT), 24H2 (E), 24H2, 23H2, 22H2 (E)), 10 (22H2 (E), 21H2 (E), 21H2 (IoT), 1809 (E), 1607 (E))x64, x86
Windows Server23H2, 2022, 2019, 2016, 2012-R2, 2012x64, x86
Windows Server Core2022, 2019, 2016, 2012-R2, 2012x64, x86

Supported .NET 6 Versions

SDK 6.0.428
The .NET SDK (Software Development Kit) is the recommended option if you plan to develop, build, test, or publish .NET 6 applications. It includes:

  • The .NET Runtime, which is required to run .NET apps.
  • The ASP.NET Core Runtime, so you can develop and host ASP.NET Core web applications out of the box.
  • The .NET CLI and build tools for compiling and managing your .NET 6 projects.

With the SDK, you won't need to install separate runtimes for ASP.NET Core or the Desktop environment—everything is bundled together to streamline development and deployment.

ASP.NET Core Runtime 6.0.36
The ASP.NET Core Runtime contains the components needed to run ASP.NET Core web applications on .NET 6. It includes libraries and features for building dynamic web pages, RESTful APIs, and real-time communication with SignalR.

Note: If you install the full .NET SDK, you already get the ASP.NET Core Runtime.

.NET Desktop Runtime 6.0.36
The .NET Desktop Runtime allows you to run Windows desktop applications built with Windows Forms or WPF (Windows Presentation Foundation). It focuses on providing a smooth experience for traditional graphical apps on Windows platforms.

.NET Runtime 6.0.36
The .NET Runtime is the base runtime required to run console or server-based .NET applications. It's more lightweight than the SDK, since it does not include compilers, build tools, or additional libraries for web or desktop development.

TuxCare applies security patches to .NET 6 for the above OS versions, ensuring continued stability and security even beyond the official end-of-life date.

Vulnerability Coverage and Target Response Times

TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.

Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.

TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:

  • High and Critical CVEs (CVSS 7+): Patches provided within 14 days
  • Medium-severity CVEs (CVSS 4.0 to 6.9): Patches provided within 60 days
  • Low-severity CVEs: Patches may be provided upon custom request
  • TuxCare may offer a mitigation strategy as an alternative to a direct code fix.

Incident Reporting and Response Timeframe

Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal https://tuxcare.com/support-portal/. TuxCare commits to providing an initial response to any reported issue within 3 days.

Requests for customer-directed security patches for CVEs that are outside of the ELS for .NET scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.

Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.

Technical Support

TuxCare provides technical support according to the support policy. It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal https://tuxcare.com/support-portal/ and to the TuxCare’s online knowledge base.

Enhanced Transparency & Visibility

TuxCare's commitment to transparency and visibility is foundational to our ELS for .NET offering. We aim to provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.

  • SLSA Compliance: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
  • Software Bill of Materials (SBOM): We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
    Note: This feature is under consideration for future development and may be available at a later date. If you’re interested, please, contact sales@tuxcare.com.
  • Verifiable Integrity and Provenance: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
    Note: This feature is under consideration for future development and may be available at a later date. If you’re interested, please, contact sales@tuxcare.com.
  • Secure Distribution: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.

Installation via the .NET Installer

Prerequisites & System Requirements

  • Operating System compatibility - please, check the supported versions section above.
  • For system requirements, please refer to the official .NET documentation.
  • Administrator rights for installation
  • Check if you have .NET already installed on your system:
    • Open Command Prompt (type cmd in the search bar) or PowerShell (type powershell in the search bar) and run the following command:
      dotnet --version
      
    • If .NET is already installed, the command will return the version number. If it’s not installed, you’ll see an error message.
    • It’s recommended that you first install the latest version of .NET before uninstalling the old one. This ensures a smooth transition without breaking the dependencies.

Installation Steps

  • Obtain the required license to get access to the service.
  • Contact sales@tuxcare.com to receive the necessary steps for generating your unique access link (tokenized URL). Anonymous access is restricted.
  • Follow the provided instructions to create your secure download link.
  • Use this link to access and download .NET 6 files.
  • Choose the appropriate runtime:
    • .NET SDK - Includes everything needed for development, including the runtime and build tools.
    • .NET Runtime - Runs .NET applications but does not include development tools.
    • .NET Runtime Desktop - Required for running desktop applications built with .NET.
    • ASP.NET Core Runtime - Needed for running web applications and services built with ASP.NET Core. For more information please refer to the official .NET documentation.
  • Download the corresponding installer based on your system type (x64 or x86). Downloading the latest version is recommended.
    • .NET SDK - Installed via an .exe installer.
    • .NET Runtime, .NET Runtime Desktop, and ASP.NET Core Runtime – Installed via .msi files.

    In certain versions of some browsers (for example, Edge), you might see a warning after downloading. In this case, manually allow the download.

Note: The following steps use the .NET SDK installation as an example. If you are installing a runtime instead, follow a similar process using the corresponding .msi file.

  • Once the installer is downloaded, double-click the file to run it. You’ll see a dialog window. Follow the on-screen instructions:
    • Accept the license agreement.
    • Click Install and wait for the process to complete. It should only take a few minutes.
    • Once the installation is finished, click Close.
  • Verify the installation. Open Command Prompt (type cmd in the search bar) or PowerShell (type powershell in the search bar) to confirm that .NET was installed successfully:
    dotnet --version
    
    Example output:
    6.0.428
    

Start Using .NET

Now that .NET is installed, you are ready to start using it. You can create and run .NET applications using the command-line tools or Visual Studio/Visual Studio Code.

If you’re new to .NET, we recommend visiting the official .NET documentation for a deeper understanding of the platform.

Create and Run a Test Project

For a quick start, you can follow this example to create and run a simple console application:

  • Open Command Prompt (type cmd in the search bar) or PowerShell (type powershell in the search bar).
  • Run the following command to create a new console application:
    dotnet new console -o MyTestApp
    
    Example output:
    Welcome to .NET 6.0!
    ---------------------
    SDK Version: 6.0.428
    
    ----------------------------------------------------------------------------
    The template "Console App" was created successfully.
    
    Processing post-creation actions...
    Running 'dotnet restore' on C:\Users\user\MyTestApp\MyTestApp.csproj...
      Determining projects to restore...
      Restored C:\Users\user\MyTestApp\MyTestApp.csproj (in 115 ms).
    Restore succeeded.
    
  • Navigate to the newly created folder:
    cd MyTestApp
    
  • Build and run the application:
    dotnet run
    
    When executed, you should see the following output:
    Hello, World!
    

Useful Commands

The following commands are useful for managing and troubleshooting .NET installation.

  • where.exe dotnet locates the dotnet executable on the system. The output shows the exact path where the dotnet command is installed. By default, the .NET installation is placed in the Program Files\dotnet folder, unless a different destination is chosen during setup.
    where.exe dotnet
    
    Example output:
    C:\Program Files\dotnet\dotnet.exe
    
  • dontet --info displays information about the installed .NET SDKs, runtimes and your OS. It also verifies the .NET is correctly set up.
    dotnet --info
    
    Example output:
    .NET SDK (reflecting any global.json):
     Version:   6.0.428
     Commit:    ef6f5ce48c
    
    Runtime Environment:
     OS Name:     Windows
     OS Version:  10.0.22631
     OS Platform: Windows
     RID:         win10-x64
     Base Path:   C:\Program Files\dotnet\sdk\6.0.428\
    
    global.json file:
      Not found
    
    Host:
      Version:      6.0.36
      Architecture: x64
      Commit:       N/A
    
    .NET SDKs installed:
      6.0.428 [C:\Program Files\dotnet\sdk]
    
    .NET runtimes installed:
      Microsoft.AspNetCore.App 6.0.36 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
      Microsoft.NETCore.App 6.0.36 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
      Microsoft.WindowsDesktop.App 6.0.36 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
    
    Download .NET:
      https://aka.ms/dotnet-download
    
    Learn about .NET Runtimes and SDKs:
      https://aka.ms/dotnet/runtimes-sdk-info
    
  • dotnet –list-sdks command lists all the .NET SDKs installed on your system. It’s recommended to uninstall the old .NET version after you install a new one.
    dotnet --list-sdks
    
    Example output:
    6.0.428 [C:\Program Files\dotnet\sdk]
    

Uninstall ELS for .NET 6

Uninstall via Windows Settings

  • Open SettingsAppsInstalled Apps or (Apps&Features on older versions).
  • Search for .NET SDK or .NET Runtime depending on what you’ve installed.
  • Click on each entry and select Uninstall.

    During the uninstall, a "Files in use" window can appear. Select "Do not close applications. A reboot will be required option" and click OK to proceed.

  • A dialog window will appear. Click Uninstall. It should take a few minutes. When the process is finished, close the window.

Uninstall via Control Panel

  • Open Control PanelProgramsPrograms and Features.
  • Search for .NET SDK or .NET Runtime depending on what you’ve installed.
  • Right-click on each entry and select Uninstall.

    During the uninstall, a "Files in use" window can appear. Select "Do not close applications. A reboot will be required option" and click OK to proceed.

  • A dialog window will appear. Click Uninstall. It should take a few minutes. When the process is finished, close the window.

Remove Remaining Files

After uninstalling .NET some files may remain in the following locations:

  • C:\Program Files\dotnet\
  • C:\Users\<user>\.dotnet\

Consider deleting the folders manually to fully remove .NET.

Frequent Issues

How do I update .NET if a new version is released?

Currently, to update .NET, you need to manually download the latest installer and follow the installation steps described above. After installing the new version, it’s recommended to remove the previous one. In the future, an automatic update mechanism for the components will be provided.

What should I do if there are conflicts during installation?

If you encounter conflicts, try uninstalling the previous version before installing the new one. In most cases, .NET versions can coexist without issues, but removing the older version may help resolve compatibility problems.