Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency Microsoft.Owin to v4 [SECURITY] #6

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Jun 19, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Microsoft.Owin 3.1.0 -> 4.2.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2020-1045

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka 'Microsoft ASP.NET Core Security Feature Bypass Vulnerability'.

CVE-2022-29117

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 where a malicious client can manipulate cookies and cause a Denial of Service.

Affected software

  • Any .NET 6.0 application running on .NET 6.0.4 or earlier.
  • Any .NET 5.0 application running .NET 5.0.16 or earlier.
  • Any .NET Core 3.1 application running on .NET Core 3.1.24 or earlier.

Affected packages

.NET Core 3.1

Package name Affected versions Patched versions
Microsoft.Owin.Security.Cookies <4.2.2 4.2.2
Microsoft.Owin.Security <4.2.2 4.2.2
Microsoft.AspNetCore.App.Runtime.win-x64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-x64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.win-x86 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.osx-x64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-arm64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-arm >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.win-arm64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.win-arm >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 >=3.0.0,3.1.24 3.1.25
Microsoft.AspNetCore.App.Runtime.linux-musl-arm >=3.0.0,3.1.24 3.1.25

.NET 5.0

Affected packages Affected versions Patched versions
Microsoft.Owin.Security.Cookies < 4.2.2 4.2.2
Microsoft.AspNetCore.App.Runtime.win-x64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-x64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.win-x86 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.osx-x64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-arm64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-arm >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.win-arm64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.win-arm >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 >=5.0.0,5.0.16 5.0.17
Microsoft.AspNetCore.App.Runtime.linux-musl-arm >=5.0.0,5.0.16 5.0.17

.NET 6.0

Affected packages Affected versions Patched versions
Microsoft.Owin.Security.Cookies <4.2.2 4.2.2
Microsoft.AspNetCore.App.Runtime.win-x64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-x64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.win-x86 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.osx-x64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-arm64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-arm >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.win-arm64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.win-arm >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.osx-arm64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 >=6.0.0,6.0.4 6.0.5
Microsoft.AspNetCore.App.Runtime.linux-musl-arm >=6.0.0,6.0.4 6.0.5

Patches

.NET 6.0, .NET 5.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.

Other Details


Release Notes

aspnet/AspNetKatana (Microsoft.Owin)

v4.2.2: 4.2.2 Release

This release includes a few bugfixes, including one with possible security implications. The packages are available on nuget.org.

See here for the complete list of changes.

v4.2.1: 4.2.1 Release

This release concludes significant build infrastructure changes and also includes a few product bug fixes. The packages are available on nuget.org.

See here for the complete list of changes.

The language specific satellite packages such as Microsoft.Owin.zh-Hans have been discontinued.

v4.2.0: 4.2.0 Release

This release includes a security feature and some minor improvements. The packages are available on nuget.org.

See here for the complete list of changes. These improvements have been completely community driven, thanks everybody for helping out!

https://github.com/aspnet/AspNetKatana/pull/389 adds PKCE support for OpenIdConnect authentication when using the code flow:

app.UseOpenIdConnectAuthentication(
    new OpenIdConnectAuthenticationOptions
    {
        ClientId = clientId,
        ClientSecret = clientSecret,
        Authority = authority,
        PostLogoutRedirectUri = postLogoutRedirectUri,
        ResponseType = OpenIdConnectResponseType.Code,
        RedeemCode = true,
        RedirectUri = redirectUri,
        UsePkce = true,
    });

v4.1.1: 4.1.1 Release

This release includes a security fix and some minor improvements. The packages are available on nuget.org.

  • CVE-2020-1045 also applies to Microsoft.Owin.
  • See here for the complete list of changes.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants