You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -2016,41 +2016,6 @@ You've successfully integrated the TuxCare ELS for Spring repository into your p
2016
2016
2017
2017
Endless Lifecycle Support (ELS) for .NET 6 from TuxCare provides security fixes for .NET 6 that has reached its end of life. This allows you to continue running .NET 6 applications without vulnerability concerns, even after official support has ended.
2018
2018
2019
-
### Vulnerability Coverage and Target Response Times
2020
-
2021
-
TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.
2022
-
2023
-
Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.
2024
-
2025
-
TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:
2026
-
***High and Critical CVEs (CVSS 7+)**: Patches provided within 14 days
2027
-
***Medium-severity CVEs (CVSS 4.0 to 6.9)**: Patches provided within 60 days
2028
-
***Low-severity CVEs**: Patches may be provided upon custom request
2029
-
* TuxCare may offer a mitigation strategy as an alternative to a direct code fix.
2030
-
2031
-
### Incident Reporting and Response Timeframe
2032
-
2033
-
Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal [https://tuxcare.com/support-portal/](https://tuxcare.com/support-portal/). TuxCare commits to providing an initial response to any reported issue within 3 days.
2034
-
2035
-
Requests for customer-directed security patches for CVEs that are outside of the ELS for .NET scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.
2036
-
2037
-
Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.
2038
-
2039
-
### Enhanced Transparency & Visibility
2040
-
2041
-
TuxCare's commitment to transparency and visibility is foundational to our ELS for .NET offering. We aim to provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.
2042
-
2043
-
***SLSA Compliance**: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
2044
-
***Software Bill of Materials (SBOM)**: We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
2045
-
<spanstyle="color: red;">_Note: Availability is planned for Q2 2025._</span>
2046
-
***Verifiable Integrity and Provenance**: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
2047
-
<spanstyle="color: red;">_Note: Availability is planned for Q2 2025._</span>
2048
-
***Secure Distribution**: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.
2049
-
2050
-
### Technical Support
2051
-
2052
-
TuxCare provides technical support according to the [support policy](https://tuxcare.com/TuxCare-support-policy.pdf). It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal [https://tuxcare.com/support-portal/](https://tuxcare.com/support-portal/) and to the TuxCare’s online knowledge base.
2053
-
2054
2019
### Supported Windows Versions
2055
2020
2056
2021
| OS | Version | Architectures |
@@ -2082,3 +2047,223 @@ The .NET Desktop Runtime allows you to run Windows desktop applications built wi
2082
2047
The .NET Runtime is the base runtime required to run console or server-based .NET applications. It's more lightweight than the SDK, since it does not include compilers, build tools, or additional libraries for web or desktop development.
2083
2048
2084
2049
TuxCare applies security patches to .NET 6 for the above OS versions, ensuring continued stability and security even beyond the official end-of-life date.
2050
+
2051
+
### Vulnerability Coverage and Target Response Times
2052
+
2053
+
TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we prioritize the NVD score.
2054
+
2055
+
Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.
2056
+
2057
+
TuxCare will make commercially reasonable efforts to adhere to the following guidelines when addressing vulnerabilities:
2058
+
***High and Critical CVEs (CVSS 7+)**: Patches provided within 14 days
2059
+
***Medium-severity CVEs (CVSS 4.0 to 6.9)**: Patches provided within 60 days
2060
+
***Low-severity CVEs**: Patches may be provided upon custom request
2061
+
* TuxCare may offer a mitigation strategy as an alternative to a direct code fix.
2062
+
2063
+
### Incident Reporting and Response Timeframe
2064
+
2065
+
Customers can report vulnerabilities by submitting a ticket through the TuxCare Support Portal [https://tuxcare.com/support-portal/](https://tuxcare.com/support-portal/). TuxCare commits to providing an initial response to any reported issue within 3 days.
2066
+
2067
+
Requests for customer-directed security patches for CVEs that are outside of the ELS for .NET scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 60 days.
2068
+
2069
+
Handling Multiple Vulnerabilities: In cases where several CVEs are reported simultaneously for fixing, TuxCare will discuss and agree upon resolution timelines separately with the customer.
2070
+
2071
+
### Technical Support
2072
+
2073
+
TuxCare provides technical support according to the [support policy](https://tuxcare.com/TuxCare-els-windows-support-policy.pdf). It delivers 24/7/365 access to the TuxCare’s support team through the TuxCare Support Portal [https://tuxcare.com/support-portal/](https://tuxcare.com/support-portal/) and to the TuxCare’s online knowledge base.
2074
+
2075
+
### Enhanced Transparency & Visibility
2076
+
2077
+
TuxCare's commitment to transparency and visibility is foundational to our ELS for .NET offering. We aim to provide comprehensive details about how each package is built, verified, and distributed, ensuring complete trust in the software supply chain.
2078
+
2079
+
***SLSA Compliance**: All packages are built and signed to ensure verifiable Supply-chain Levels for Software Artifacts (SLSA) compliance. They are securely constructed from vetted sources, include attestations for all dependencies, and undergo continuous testing to maintain integrity and security.
2080
+
***Software Bill of Materials (SBOM)**: We provide complete visibility into the software supply chain with a comprehensive inventory of every package in the codebase, ensuring transparency and accountability in your software ecosystem.
2081
+
<spanstyle="color: red;">_Note: This feature is under consideration for future development and may be available at a later date. If you’re interested, please, contact [[email protected]](mailto:[email protected])._</span>
2082
+
***Verifiable Integrity and Provenance**: Our packages and metadata provide comprehensive end-to-end provenance, detailing how each package was constructed and tested, ensuring that all components in your software stack are trustworthy.
2083
+
<spanstyle="color: red;">_Note: This feature is under consideration for future development and may be available at a later date. If you’re interested, please, contact [[email protected]](mailto:[email protected])._</span>
2084
+
***Secure Distribution**: Signed versions of the packages and their metadata are distributed from a registry managed, secured, and protected by TuxCare, guaranteeing that your software updates are authentic and untampered.
2085
+
2086
+
### Installation via the .NET Installer
2087
+
2088
+
#### Prerequisites & System Requirements
2089
+
* Operating System compatibility - please, check the [supported versions](#supported-windows-versions) section above.
2090
+
* For system requirements, please refer to the [official .NET documentation](https://learn.microsoft.com/en-us/dotnet/fundamentals/).
2091
+
* Administrator rights for installation
2092
+
* Check if you have .NET already installed on your system:
2093
+
* Open *Command Prompt* (type `cmd` in the search bar) or *PowerShell* (type `powershell` in the search bar) and run the following command:
2094
+
```
2095
+
dotnet --version
2096
+
```
2097
+
* If .NET is already installed, the command will return the version number. If it’s not installed, you’ll see an error message.
2098
+
* It’s recommended that you first install the latest version of .NET before uninstalling the old one. This ensures a smooth transition without breaking the dependencies.
2099
+
2100
+
#### Installation Steps
2101
+
2102
+
* Obtain the required license to get access to the service.
2103
+
* Contact [[email protected]](mailto:[email protected]) to receive the necessary steps for generating your unique access link (tokenized URL). Anonymous access is restricted.
2104
+
* Follow the provided instructions to create your secure download link.
2105
+
* Use this link to access and download .NET 6 files.
2106
+
* Choose the appropriate runtime:
2107
+
* **.NET SDK** - Includes everything needed for development, including the runtime and build tools.
2108
+
* **.NET Runtime** - Runs .NET applications but does not include development tools.
2109
+
* **.NET Runtime Desktop** - Required for running desktop applications built with .NET.
2110
+
* **ASP.NET Core Runtime** - Needed for running web applications and services built with ASP.NET Core.
2111
+
For more information please refer to the [official .NET documentation](https://learn.microsoft.com/en-us/dotnet/fundamentals/).
2112
+
* Download the corresponding installer based on your system type (x64 or x86). Downloading the latest version is recommended.
2113
+
* .NET SDK - Installed via an .exe installer.
2114
+
* .NET Runtime, .NET Runtime Desktop, and ASP.NET Core Runtime – Installed via .msi files.
2115
+
:::tip
2116
+
In certain versions of some browsers (for example, Edge), you might see a warning after downloading. In this case, manually allow the download.
2117
+
:::
2118
+
2119
+
<span style="color: red;">_Note: The following steps use the .NET SDK installation as an example. If you are installing a runtime instead, follow a similar process using the corresponding .msi file._</span>
2120
+
* Once the installer is downloaded, double-click the file to run it. You’ll see a dialog window. Follow the on-screen instructions:
2121
+

2122
+
* Accept the **license agreement**.
2123
+
* Click **Install** and wait for the process to complete. It should only take a few minutes.
2124
+
* Once the installation is finished, click **Close**.
2125
+
* Verify the installation. Open *Command Prompt* (type `cmd` in the search bar) or *PowerShell* (type `powershell` in the search bar) to confirm that .NET was installed successfully:
2126
+
```
2127
+
dotnet --version
2128
+
```
2129
+
Example output:
2130
+
```
2131
+
6.0.428
2132
+
```
2133
+
2134
+
### Start Using .NET
2135
+
2136
+
Now that .NET is installed, you are ready to start using it. You can create and run .NET applications using the command-line tools or Visual Studio/Visual Studio Code.
2137
+
2138
+
If you’re new to .NET, we recommend visiting the [official .NET documentation](https://learn.microsoft.com/en-us/dotnet/fundamentals/) for a deeper understanding of the platform.
2139
+
2140
+
#### Create and Run a Test Project
2141
+
2142
+
For a quick start, you can follow this example to create and run a simple console application:
2143
+
* Open *Command Prompt* (type `cmd` in the search bar) or *PowerShell* (type `powershell` in the search bar).
2144
+
* Run the following command to create a new console application:
The template "Console App" was created successfully.
2156
+
2157
+
Processing post-creation actions...
2158
+
Running 'dotnet restore' on C:\Users\user\MyTestApp\MyTestApp.csproj...
2159
+
Determining projects to restore...
2160
+
Restored C:\Users\user\MyTestApp\MyTestApp.csproj (in 115 ms).
2161
+
Restore succeeded.
2162
+
```
2163
+
* Navigate to the newly created folder:
2164
+
```
2165
+
cd MyTestApp
2166
+
```
2167
+
* Build and run the application:
2168
+
```
2169
+
dotnet run
2170
+
```
2171
+
When executed, you should see the following output:
2172
+
```
2173
+
Hello, World!
2174
+
```
2175
+
2176
+
#### Useful Commands
2177
+
2178
+
The following commands are useful for managing and troubleshooting .NET installation.
2179
+
* `where.exe` dotnet locates the dotnet executable on the system. The output shows the exact path where the dotnet command is installed. By default, the .NET installation is placed in the Program Files\dotnet folder, unless a different destination is chosen during setup.
2180
+
```
2181
+
where.exe dotnet
2182
+
```
2183
+
Example output:
2184
+
```
2185
+
C:\Program Files\dotnet\dotnet.exe
2186
+
```
2187
+
* `dontet --info` displays information about the installed .NET SDKs, runtimes and your OS. It also verifies the .NET is correctly set up.
* `dotnet –list-sdks` command lists all the .NET SDKs installed on your system. It’s recommended to uninstall the old .NET version after you install a new one.
2227
+
```
2228
+
dotnet --list-sdks
2229
+
```
2230
+
Example output:
2231
+
```
2232
+
6.0.428 [C:\Program Files\dotnet\sdk]
2233
+
```
2234
+
2235
+
### Uninstall ELS for .NET 6
2236
+
2237
+
#### Uninstall via Windows Settings
2238
+
* Open **Settings** → **Apps** → **Installed Apps** or (**Apps&Features** on older versions).
2239
+
* Search for *.NET SDK* or *.NET Runtime* depending on what you’ve installed.
2240
+
* Click on each entry and select **Uninstall**.
2241
+
:::tip
2242
+
During the uninstall, a **"Files in use"** window can appear. Select **"Do not close applications. A reboot will be required option"** and click **OK** to proceed.
2243
+
:::
2244
+
* A dialog window will appear. Click **Uninstall**. It should take a few minutes. When the process is finished, close the window.
2245
+
2246
+
#### Uninstall via Control Panel
2247
+
* Open **Control Panel** → **Programs** → **Programs and Features**.
2248
+
* Search for *.NET SDK* or *.NET Runtime* depending on what you’ve installed.
2249
+
* Right-click on each entry and select **Uninstall**.
2250
+
:::tip
2251
+
During the uninstall, a **"Files in use"** window can appear. Select **"Do not close applications. A reboot will be required option"** and click **OK** to proceed.
2252
+
:::
2253
+
* A dialog window will appear. Click **Uninstall**. It should take a few minutes. When the process is finished, close the window.
2254
+
2255
+
#### Remove Remaining Files
2256
+
After uninstalling .NET some files may remain in the following locations:
2257
+
* `C:\Program Files\dotnet\`
2258
+
* `C:\Users\<user>\.dotnet\`
2259
+
2260
+
Consider deleting the folders manually to fully remove .NET.
2261
+
2262
+
### Frequent Issues
2263
+
**How do I update .NET if a new version is released?**
2264
+
2265
+
Currently, to update .NET, you need to manually download the latest installer and follow the installation steps described above. After installing the new version, it’s recommended to remove the previous one. In the future, an automatic update mechanism for the components will be provided.
2266
+
2267
+
**What should I do if there are conflicts during installation?**
2268
+
2269
+
If you encounter conflicts, try uninstalling the previous version before installing the new one. In most cases, .NET versions can coexist without issues, but removing the older version may help resolve compatibility problems.
0 commit comments