.NET
Endless Lifecycle Support (ELS) for .NET from TuxCare delivers security fixes for .NET library, framework, and tool packages, distributed through NuGet packages. This allows you to continue running your .NET applications without vulnerability concerns, even after official support has ended.
NuGet is the standard package manager for .NET, used to deliver the reusable components that applications depend on. ELS applies fixes at the package level, so your applications receive security updates without requiring changes to your own code.
Supported NuGet packages
- .NET 6, 8, 10
- AutoMapper 2.2.2, 3.3.2, 4.2.2, 5.2.1, 6.2.3, 7.0.2, 8.1.2, 9.0.1, 10.1.2, 11.0.2, 12.0.2, 13.0.2, 14.0.1
- log4net 1.2.15, 1.2.16
- Microsoft.Azure.Storage.DataMovement 1.2.0, 1.2.1
- Microsoft.Data.SqlClient 1.1.4, 1.1.5
- Microsoft.Owin 3.1.0, 3.1.1
- MimeKit 3.6.1, 3.6.2
- Newtonsoft.Json 4.5.11, 4.5.12, 6.0.8, 6.0.9, 8.0.3, 8.0.4, 9.0.1, 9.0.2, 10.0.3, 10.0.4, 11.0.2, 11.0.3, 12.0.3, 12.0.4
- NHibernate 4.1.2.4001
- Refit 6.3.2, 6.3.3
- RestSharp 108.0.3, 108.0.4, 110.2.0, 110.2.1, 111.4.1, 111.4.2
- SharpZipLib 0.86.0, 0.86.1
- SixLabors.ImageSharp 1.0.5
- System.Formats.Asn1 5.0.1, 7.0.1
- System.Text.Json 7.0.5
Other versions upon request.
Installation
Prerequisites
- .NET SDK installed — TuxCare also provides a supported .NET SDK build
- Nexus repository access credentials (username and password) — contact sales@tuxcare.com. Anonymous access is disabled.
- To browse available artifacts, visit TuxCare Nexus and sign in. You may need to refresh the page after logging in.
Locate your project
Ensure you are in a directory that contains a valid .NET project — the folder must include a
.csprojfile:dir *.csprojIf a
.csprojfile is not found, create a new project:dotnet new console -o MyProject cd MyProjectRegister the TuxCare NuGet repository
Add the
els_dotnetNuGet source either with thedotnetCLI or by editingnuget.config. Replace<els_dotnet_customerN>with your customer repository name provided by TuxCare.dotnet nuget add source "https://nexus.repo.tuxcare.com/repository/<els_dotnet_customerN>/index.json" --name TuxCareAdd your TuxCare credentials
Replace
USERNAMEandPASSWORDwith the credentials provided by TuxCare.dotnet nuget update source TuxCare --username USERNAME --password PASSWORDAvoid committing credentials to version control. Consider using environment variables or a separate local configuration file for sensitive information.
When using the CLI, the password is stored as a hash. When editing
nuget.configmanually, the password is stored in plain text — use<ClearTextPassword>only when a hashed password isn't practical.Verify the source
To verify that the source was added successfully, list all configured NuGet sources:
dotnet nuget list sourceInstall the patched package
Install the TuxCare-maintained release that matches your project:
dotnet add package <PACKAGE_NAME> --version <VERSION>For example:
dotnet add package Newtonsoft.Json --version 12.0.4-tuxcare-elsCheck the exact version listed in your TuxCare Nexus account to ensure you receive the most recent patched release.
If you edited
nuget.configmanually, rundotnet restorein your project directory to install packages and resolve dependencies against the TuxCare repository:dotnet restore
Resolved CVEs
| CVE ID | Severity | Affected Package | Affected Versions | Safe Versions |
|---|---|---|---|---|
| CVE-2026-32933 | High | AutoMapper | < 15.1.1; 16.0.0 ≤ v < 16.1.1 | See Nexus |
| CVE-2018-1285 | Critical | log4net | < 2.0.10 | See Nexus |
| CVE-2024-35252 | High | Microsoft.Azure.Storage.DataMovement | < 2.0.0 | See Nexus |
| CVE-2024-0056 | High | Microsoft.Data.SqlClient | < 2.1.7 | See Nexus |
| CVE-2020-1045 | High | Microsoft.Owin | ASP.NET Core 2.1 ≤ v ≤ 2.1.21; 3.1 ≤ v < 3.1.8 | See Nexus |
| CVE-2022-29117 | High | Microsoft.Owin | .NET 5.0, 6.0.0; .NET Core 3.1 (specific releases) | See Nexus |
| CVE-2024-38095 | High | MimeKit | >= 3.0.0, < 4.7.1 | See Nexus |
| GHSA-gmc6-fwg3-75m5 | High | MimeKit | >= 3.0.0, < 4.7.1 | See Nexus |
| CVE-2024-39677 | Medium | NHibernate | < 5.4.9 | See Nexus |
| CVE-2024-21907 | High | Newtonsoft.Json | < 13.0.1 | See Nexus |
| GHSA-5crp-9r3c-p9vr | High | Newtonsoft.Json | < 13.0.1 | See Nexus |
| CVE-2024-51501 | Critical | Refit | < 7.2.22 | See Nexus |
| CVE-2024-45302 | High | RestSharp | >= 107.0.0, < 112.0.0 | See Nexus |
| GHSA-4rr6-2v9v-wcpc | Medium | RestSharp | >= 107.0.0-preview.1, < 112.0.0 | See Nexus |
| CVE-2021-32840 | Critical | SharpZipLib | < 1.3.3 | See Nexus |
| CVE-2021-32841 | Medium | SharpZipLib | >= 1.3.0, < 1.3.3 | See Nexus |
| CVE-2021-32842 | Medium | SharpZipLib | >= 1.0.0, < 1.3.3 | See Nexus |
| CVE-2024-27929 | High | SixLabors.ImageSharp | < 2.1.7; 3.1.0 ≤ v < 3.1.3 | See Nexus |
| CVE-2025-27598 | High | SixLabors.ImageSharp | < 2.1.10; 3.0.0 ≤ v < 3.1.7 | See Nexus |
| CVE-2025-54575 | Medium | SixLabors.ImageSharp | < 2.1.11; 3.0.0 ≤ v < 3.1.11 | See Nexus |
| CVE-2024-38095 | High | System.Formats.Asn1 | 5.0.0-pre ≤ v < 6.0.1; 7.0.0-pre ≤ v < 8.0.1 | See Nexus |
| CVE-2024-30105 | High | System.Text.Json | 7.0.0 ≤ v < 8.0.4 | See Nexus |