-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] #862
Open
marvin-serp-bot
wants to merge
1
commit into
main
Choose a base branch
from
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] #862
marvin-serp-bot
wants to merge
1
commit into
main
from
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
✒️ PR Title Commitlint - ✔️ Lint success! |
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
3 times, most recently
from
October 16, 2024 16:05
d7305f6
to
83a03dd
Compare
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
from
October 17, 2024 14:05
83a03dd
to
868f757
Compare
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
Oct 19, 2024
marvin-serp-bot
deleted the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 19, 2024 05:05
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
Oct 19, 2024
marvin-serp-bot
restored the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 19, 2024 06:06
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
Oct 19, 2024
marvin-serp-bot
deleted the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 19, 2024 15:05
marvin-serp-bot
restored the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 19, 2024 16:04
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
Oct 19, 2024
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
Oct 22, 2024
marvin-serp-bot
deleted the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 22, 2024 18:05
marvin-serp-bot
restored the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 22, 2024 19:06
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
Oct 22, 2024
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
Oct 31, 2024
marvin-serp-bot
deleted the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 31, 2024 10:06
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
Oct 31, 2024
marvin-serp-bot
restored the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
October 31, 2024 11:05
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
3 times, most recently
from
November 19, 2024 15:06
675de76
to
490e966
Compare
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
8 times, most recently
from
December 4, 2024 18:07
7501a02
to
7585baa
Compare
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
9 times, most recently
from
December 13, 2024 13:12
d40e15a
to
1197c09
Compare
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
Dec 14, 2024
marvin-serp-bot
deleted the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
December 14, 2024 00:20
marvin-serp-bot
changed the title
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security] - autoclosed
chore(deps): update dependency system.identitymodel.tokens.jwt to 6.34.0 [security]
Dec 14, 2024
marvin-serp-bot
restored the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
December 14, 2024 01:32
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
from
January 7, 2025 13:09
1197c09
to
19612dd
Compare
marvin-serp-bot
force-pushed
the
upgrade/nuget-system.identitymodel.tokens.jwt-vulnerability
branch
from
January 9, 2025 14:06
19612dd
to
d54eadc
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
6.33.0
->6.34.0
GitHub Vulnerability Alerts
CVE-2024-21319
Microsoft Security Advisory CVE-2024-21319: .NET Denial of Service Vulnerability
Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in the ASP.NET Core project templates. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.
A Denial of Service vulnerability exists in ASP.NET Core project templates which utilize JWT-based authentication tokens. This vulnerability allows an unauthenticated client to consume arbitrarily large amounts of server memory, potentially triggering an out-of-memory condition on the server and making the server no longer able to respond to legitimate requests.
Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/290
Mitigation factors
This impacts only .NET Core-based projects that were created using any version of project templates listed in affected software.
Other project templates e.g., console applications, MAUI applications, Windows Forms or WPF applications, are not affected.
Affected software
This impacts only .NET Core-based projects that were created using any version of the below project templates.
Advisory FAQ
How do I know if I am affected?
If you are you using project templates listed in affected software, you may be exposed to the vulnerability.
How do I fix the issue?
For existing projects:
If you ever created any of these projects via the dotnet new command or via Visual Studio's File -> New Project gesture, and if you enabled federated authentication at project creation time, your project may be vulnerable. To remediate the vulnerability, use your package manager to update any references you may have to the Microsoft.AspNetCore.Authentication.JwtBearer, Microsoft.AspNetCore.Authentication.OpenIdConnect, and Microsoft.IdentityModel.JsonWebTokens packages to their respective latest versions.
If your project does not reference any of those three packages, you are not exposed to this vulnerability.
For new projects:
To remediate this issue please update to the latest SDK listed below. Simply installing the SDK update is not sufficient to remediate projects already-created / already-deployed projects which existed prior to this update being released.
dotnet --info
command. You will see output like the following;.NET 6.0, .NET 7.0, .NET 8.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed self-contained applications targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
Other Information
Reporting Security Issues
If you have found a potential security issue in .NET 8.0 or .NET 7.0 or .NET 6.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.
Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Acknowledgement
Morgan Brown, Microsoft Corp.
External Links
CVE-2024-21319
Release Notes
AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet (System.IdentityModel.Tokens.Jwt)
v6.34.0
Security fixes
See https://aka.ms/IdentityModel/Jan2024/zip and https://aka.ms/IdentityModel/Jan2024/jku for details.
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.