Bump github.com/lestrrat-go/jwx from 1.2.26 to 1.2.29 in /identity-engine/embedded-auth-with-sdk
Bumps github.com/lestrrat-go/jwx from 1.2.26 to 1.2.29.
Release notes
Sourced from github.com/lestrrat-go/jwx's releases.
v1.2.29 07 Mar 2024
[Security]
[jwe] Added
jwe.Settings(jwe.WithMaxDecompressBufferSize(int64))to specify the maximum size of a decompressed JWE payload. The default value is 10MB. If you are compressing payloads greater than this, you need to explicitly set it.Unlike in v2, there is no way to set this globally. Please use v2 if this is required.
v1.2.28
v1.2.28 09 Jan 2024 [Security Fixes] * [jws] JWS messages formated in full JSON format (i.e. not the compact format, which consists of three base64 strings concatenated with a '.') with missing "protected" headers could cause a panic, thereby introducing a possiblity of a DoS.This has been fixed so that the `jws.Parse` function succeeds in parsing a JWS message lacking a protected header. Calling `jws.Verify` on this same JWS message will result in a failed verification attempt. Note that this behavior will differ slightly when parsing JWS messages in compact form, which result in an error.v1.2.27
v1.2.27 - 03 Dec 2023 [Security] * [jwe] A large number in p2c parameter for PBKDF2 based encryptions could cause a DoS attack, similar to https://nvd.nist.gov/vuln/detail/CVE-2022-36083. All users should upgrade, as unlike v2, v1 attempts to decrypt JWEs on JWTs by default. [GHSA-7f9x-gw85-8grf][Bug Fixes]
- [jwk] jwk.Set(jwk.KeyOpsKey, <jwk.KeyOperation>) now works (previously, either Set(.., <string>) or Set(..., []jwk.KeyOperation{...}) worked, but not a single jwk.KeyOperation
Changelog
Sourced from github.com/lestrrat-go/jwx's changelog.
v1.2.29 07 Mar 2024
[jwe] Added
jwe.Settings(jwe.WithMaxDecompressBufferSize(int64))to specify the maximum size of a decompressed JWE payload. The default value is 10MB. If you are compressing payloads greater than this, you need to explicitly set it.Unlike in v2, there is no way to set this globally. Please use v2 if this is required.
v1.2.28 09 Jan 2024 [Security Fixes]
[jws] JWS messages formated in full JSON format (i.e. not the compact format, which consists of three base64 strings concatenated with a '.') with missing "protected" headers could cause a panic, thereby introducing a possiblity of a DoS.
This has been fixed so that the
jws.Parsefunction succeeds in parsing a JWS message lacking a protected header. Callingjws.Verifyon this same JWS message will result in a failed verification attempt. Note that this behavior will differ slightly when parsing JWS messages in compact form, which result in an error.v1.2.27 - 03 Dec 2023 [Security]
- [jwe] A large number in p2c parameter for PBKDF2 based encryptions could cause a DoS attack, similar to https://nvd.nist.gov/vuln/detail/CVE-2022-36083. All users should upgrade, as unlike v2, v1 attempts to decrypt JWEs on JWTs by default. [GHSA-7f9x-gw85-8grf]
[Bug Fixes]
- [jwk] jwk.Set(jwk.KeyOpsKey, ) now works (previously, either Set(.., ) or Set(..., []jwk.KeyOperation{...}) worked, but not a single jwk.KeyOperation
Commits
1025f8eMerge pull request #1092 from lestrrat-go/develop/v14399aceMerge branch 'v1' into develop/v1dc80fedUpdate Changese4c1511silence linterd01027dMerge pull request from GHSA-hj3v-m684-v2593d6e0e0Bump github.com/stretchr/testify from 1.8.4 to 1.9.0 (#1085)3af5916Bump golang.org/x/crypto from 0.19.0 to 0.21.0 (#1087)7a05818Bump golang.org/x/crypto from 0.18.0 to 0.19.0 (#1074)8e2aacdBump golangci/golangci-lint-action from 3 to 4 (#1076)4b1fd05Bump kentaro-m/auto-assign-action from 1.2.6 to 2.0.0 (#1068)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.