Skip to content

Upgrade packages with vulnerability#17801

Closed
MikeAlhayek wants to merge 1 commit intorelease/2.1from
ma/update-vulnerability
Closed

Upgrade packages with vulnerability#17801
MikeAlhayek wants to merge 1 commit intorelease/2.1from
ma/update-vulnerability

Conversation

@MikeAlhayek
Copy link
Member

@MikeAlhayek MikeAlhayek commented Apr 15, 2025

@kevinchalet is it okay to update only these 2 packages in to /release.2.1 branch? Need to address the current vulnerability issue with these two dependencies and ship 2.1.7.

Note this is based on release/2.1 branch not main.

@MikeAlhayek MikeAlhayek changed the title Upgrader packages with vulnerability Upgrade packages with vulnerability Apr 15, 2025
@kevinchalet
Copy link
Member

@kevinchalet is it okay to update only these 2 packages in to /release.2.1 branch?

Well:

  • The stable release references an old OpenIddict version (5.8) that is no longer developed or supported so it's not a scenario I'm testing: "your mileage may vary" 🤣
  • The most recent IM versions reference a .NET 9.0 package (Microsoft.Bcl.Memory) on all their TFMs (including .NET 8.0), which could be problematic in some cases (someone told me they hit an issue with a .NET 8.0 app on Ubuntu Server, that has a very specific packaging and support policy for .NET).

@MikeAlhayek
Copy link
Member Author

If we have to upgrade OpenId, we would have to release v2.2.0 instead of v2.1.7 so I was hoping to avoid having to do that. But if it is safer to upgrade OpenId and release v2.2.0 then maybe that is what we should do?

@kevinchalet
Copy link
Member

Last time I suggested that (in January IIRC), it was ruled out because 3.0 was around the corner, which made releasing a 2.2 version not very appealing. Has anything changed in this regard?

If you decide to bump the OpenIddict version in the 2.x branch, you'll need to backport these 2 PRs:

@MikeAlhayek
Copy link
Member Author

@sebastienros should we release v2.2.0 instead of v2.1.7 only with the PRs we already backported along with the 2 PR referenced above? I think we are a bit far on v3.0.0.

@sebastienros
Copy link
Member

@sebastienros
Copy link
Member

There is no ideal solution with the current state of things. I suggest we keep the net9.0 Microsoft.Bcl dependency, so reference all valid versions, but once there is an IM with a truly long support then we switch to it. Hopefully before net9.0 becomes unsupported, which is in a year: May 12, 2026.

@kevinchalet
Copy link
Member

FWIW, I came to the same conclusion when I had to decide what do in OpenIddict 7.0 (that will require ASP.NET Core 2.3+ instead of 2.1+ and thus will reference the 8.0 version of the .NET Extensions on older TFMs): previous OpenIddict versions referenced older IM versions for the older TFMs to avoid having mixed .NET Extensions versions, but 7.0 will target IM 8.x for all TFMs.

Hopefully they’ll be able to remove that dependency so this won’t be a problem at all.

@MikeAlhayek
Copy link
Member Author

We decided to ship 2.1.7 with the vulnerability packages since they existing in 2.1.6 also until there is a fix or v3 is released.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants