Skip to content

chore(deps): update nuget packages#1159

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/nuget
Open

chore(deps): update nuget packages#1159
renovate[bot] wants to merge 1 commit intomainfrom
renovate/nuget

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Feb 17, 2026

This PR contains the following updates:

Package Change Age Confidence
AMQPNetLite.Core 2.5.12.5.2 age confidence
AWSSDK.Core 3.7.500.803.7.500.96 age confidence
AWSSDK.S3 3.7.510.63.7.511.6 age confidence
AWSSDK.SQS 3.7.502.393.7.502.55 age confidence
AWSSDK.SecurityToken 3.7.504.323.7.504.48 age confidence
Destructurama.Attributed (source) 5.2.05.3.0 age confidence
Google.Cloud.PubSub.V1 3.32.03.33.0 age confidence
Microsoft.AspNetCore.TestHost (source) 8.0.248.0.26 age confidence
Microsoft.Bcl.AsyncInterfaces (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Caching.Memory (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Configuration (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Configuration.Binder (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Configuration.CommandLine (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Configuration.EnvironmentVariables (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Configuration.Json (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.DependencyInjection (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.DependencyInjection.Abstractions (source) 10.0.310.0.7 age confidence
Microsoft.Extensions.Diagnostics.HealthChecks (source) 8.0.248.0.26 age confidence
Microsoft.Extensions.Logging.Abstractions (source) 10.0.310.0.7 age confidence
Microsoft.NET.Test.Sdk 18.0.118.4.0 age confidence
NATS.Client.JetStream 2.7.22.7.3 age confidence
NATS.Net 2.7.22.7.3 age confidence
NUnit (source) 4.4.04.5.1 age confidence
NUnit.Analyzers 4.11.24.12.0 age confidence
NUnit3TestAdapter (source) 6.1.06.2.0 age confidence
OpenTelemetry (source) 1.15.01.15.3 age confidence
OpenTelemetry.Extensions.Hosting (source) 1.15.01.15.3 age confidence
StackExchange.Redis (source) 2.11.02.12.14 age confidence
coverlet.collector 8.0.08.0.1 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

Azure/amqpnetlite (AMQPNetLite.Core)

v2.5.2: Release 2.5.2

Fixes and improvements:

  • [#​630] Add OnLinkStateProperties callback for flow link-state properties
  • [#​634] Handle ObjectDisposedException in WebSocket close
aws/aws-sdk-net (AWSSDK.S3)

v3.7.511

destructurama/attributed (Destructurama.Attributed)

v5.3.0

Compare Source

New features

  • Add UsingAttributes overload used by serilog-settings-configuration by @​sungam3r in #​230

Changes for CI and tests

Full Changelog: destructurama/attributed@5.2.0...5.3.0

googleapis/google-cloud-dotnet (Google.Cloud.PubSub.V1)

v3.33.0: Google.Cloud.PubSub.V1 version 3.33.0

Compare Source

New features
  • Add BigtableConfig type
dotnet/dotnet (Microsoft.Bcl.AsyncInterfaces)

v10.0.7

v10.0.6

v10.0.5

v10.0.4

microsoft/vstest (Microsoft.NET.Test.Sdk)

v18.4.0

What's Changed
New Contributors

Full Changelog: microsoft/vstest@v18.3.0...v18.4.0

v18.3.0

What's Changed
Internal fixes and updates
New Contributors
nats-io/nats.net (NATS.Client.JetStream)

v2.7.3: NATS .NET v2.7.3

Announcing a new version of NATS .NET client library covering various fixes and a security update on one dependency for NETStandard targets (#​1089) even though the vulnerable API is not used by our library.

A big thank you to all NATS contributors and community members who helped make this release possible ❤️

Breaking Changes
NakAsync Signature Change (#​1081)

The TimeSpan delay parameter has been removed from INatsJSMsg<T>.NakAsync(). The delay must now be passed via AckOpts.NakDelay.

Before (v2.7.2):

await msg.NakAsync(delay: TimeSpan.FromSeconds(5));
await msg.NakAsync(opts, TimeSpan.FromSeconds(5));

After (v2.7.3):

// Option 1: Use the new extension method
await msg.NakAsync(TimeSpan.FromSeconds(5));

// Option 2: Use AckOpts with NakDelay
await msg.NakAsync(new AckOpts { NakDelay = TimeSpan.FromSeconds(5) });

Note: because we also have an extension method, recompiling your project is enough.

AckTerminateAsync TermWithReason (#​1048, #​1081)

AckTerminateAsync now supports an optional termination reason. A new overload and a new TerminateReason property on AckOpts have been added to INatsJSMsg<T>. Implementors of this interface must add the new method.

// New overload
await msg.AckTerminateAsync("processing failed permanently");

// Or via AckOpts
await msg.AckTerminateAsync(new AckOpts { TerminateReason = "processing failed permanently" });

// Extension method shorthand
await msg.AckTerminateAsync("reason", cancellationToken);

Requires NATS Server 2.10.4+.

PinnedClient Validation (#​1063)

Calling NextAsync(), FetchAsync(), or FetchNoWaitAsync() on a consumer with PriorityPolicy.PinnedClient now throws NatsJSException. Use ConsumeAsync() instead.

// This now throws NatsJSException:
var msg = await consumer.NextAsync<string>();

// Use ConsumeAsync instead:
await foreach (var msg in consumer.ConsumeAsync<string>())
{
    // process message
}
Consumer Cancellation Handling (#​1068)

Consumer methods (ConsumeAsync, FetchAsync, NextAsync) now call cancellationToken.ThrowIfCancellationRequested() immediately at method entry. Previously cancelled tokens were checked later in the async pipeline.

var cts = new CancellationTokenSource();
cts.Cancel();

// v2.7.2: exception thrown sometime during async operation
// v2.7.3: OperationCanceledException thrown immediately
await consumer.FetchAsync<string>(cancellationToken: cts.Token);
StreamSnapshotRequest ChunkSize Type Change (#​1088)

StreamSnapshotRequest.ChunkSize changed from long to int? with a narrower validation range (1KB–1MB). WindowSize (int?) was added as a new optional property.

// Before (v2.7.2)
var req = new StreamSnapshotRequest { ChunkSize = 1024L };

// After (v2.7.3)
var req = new StreamSnapshotRequest
{
    ChunkSize = 1024,          // int? now, valid range: 1024–1048576
    WindowSize = 8388608,      // new optional, valid range: 1024–33554432
};

WindowSize requires NATS Server 2.12.5+.

OpenTelemetry Tag Change (#​1078)

The telemetry tag network.protocol.version (value: protocol version number) has been replaced with network.transport (value: "tcp") to align with OpenTelemetry semantic conventions. Update any dashboards or alerting rules that filter on the old tag name.

Default Parameter Values Changed from default to null (#​1081)

All optional parameters on INatsJSMsg<T> methods (AckAsync, NakAsync, AckProgressAsync, AckTerminateAsync, ReplyAsync) changed from = default to = null. This is source-compatible but binary-breaking — existing compiled assemblies must be recompiled against v2.7.3.

What's Changed

Full Changelog: nats-io/nats.net@v2.7.2...v2.7.3

CVE Update

Microsoft.Bcl.Memory is a transitive dependency for netstandard2.0 targets any app pulling in NATS.Client.Core gets it. Even though this library doesn't call the vulnerable Base64Url.Decode API, the consuming application (or another dependency in its graph) might. A CVSSv3 7.5 DoS from a malformed network input is not something you want sitting in your dependency tree. (Microsoft CVE )

If you are not upgrading to this new version of NATS .NET AND targeting NETStandard2.0, applications should add an explicit package reference to force the patched version:

  <PackageReference Include="Microsoft.Bcl.Memory" Version="9.0.14" />

You don't need to upgrade NATS.NET itself to get the fix if you need time. NuGet will happily resolve the newer patch version of Microsoft.Bcl.Memory since it's within the same major.minor range.

Here is a report generated by AI:

NAT .NET library implementation is not affected by the same bug. Different vulnerability, different code.

The CVE is about an out-of-bounds read in System.Buffers.Text.Base64Url's decode path when processing malformed
input — that's a SIMD-optimized native implementation with pointer arithmetic that can overrun its buffer.

Your custom Base64UrlEncoder (borrowed from Azure AD IdentityModel):

  • Decode path: Converts Base64Url chars back to standard Base64 chars (- → +, _ → /), pads with =, then delegates to
    Convert.FromBase64String(). The actual decoding is done by the framework's well-tested Convert.FromBase64String,
    which will throw FormatException on malformed input rather than reading out of bounds.
  • Validates input length: Rejects length % 4 == 1 upfront (line 164), which is always invalid.
  • Bounded loops: The unsafe code in UnsafeDecode only iterates up to str.Length and decodedLength (which is at most
    str.Length + 3), and the output string is allocated to exactly decodedLength.

The implementation is sound. It's not pretty (mutating "immutable" strings via fixed pointers is a hack), but it's
not vulnerable to the same class of bug.

Download from NuGet at https://www.nuget.org/packages/NATS.Net/2.7.3

nunit/nunit (NUnit)

v4.5.1: V 4.5.1

Compare Source

See release notes for details.

v4.5.0: V 4.5.0

Compare Source

See release notes for details.

nunit/nunit.analyzers (NUnit.Analyzers)

v4.12.0: NUnit Analyzers 4.12 - March 3, 2026

Compare Source

NUnit Analyzers 4.12 - March 3, 2026

This release of the NUnit Analyzers improves NUnit1029 to account for TestCaseSource
support for params and optional arguments. It also introduces a new analyzer for incorrect
usage of Is.Not.Null.Or.Empty, fixes regressions in NUnit2005 and NUnit2055, and updates
NUnit package dependencies.

The release contains contributions from the following users (in alphabetical order):

Issues Resolved

Features and Enhancements

  • #​957 Relax NUnit1029 for TestCaseSource where method accepts a single "params" array
  • #​189 Warning when Is.Not.Null.Or.Empty used

Bugs

  • #​953 Code fix for NUnit2055 can generate invalid code for classic asserts
  • #​952 Code fix for NUnit2005 tries to use Is.Empty constraint on incompatible types.

Tooling, Process, and Documentation

  • #​973 chore: Bump NUnit version
  • #​970 chore: Bump NUnit to version 4.5.0
  • #​967 Fix note about works with Unity Test Framework
  • #​937 chore: bump version
nunit/nunit3-vs-adapter (NUnit3TestAdapter)

v6.2.0: V 6.2.0

See release notes

open-telemetry/opentelemetry-dotnet (OpenTelemetry)

v1.15.3

Release details: 1.15.3

  • Breaking change: Fixed tracestate parsing to reject keys that do not
    begin with a lowercase letter, including keys beginning with digits, to
    align with the W3C Trace Context specification.
  • Breaking change: Fixed an insecure disk retry default for OTLP export.
    Disk retry now requires OTEL_DOTNET_EXPERIMENTAL_OTLP_DISK_RETRY_DIRECTORY_PATH
    when OTEL_DOTNET_EXPERIMENTAL_OTLP_RETRY=disk is configured.
  • Improve efficiency of parsing of baggage and B3 propagation headers.
  • OtlpLogExporter now uses IHttpClientFactory on .NET 8+.
  • Fixed an issue in OTLP/gRPC retry handling where parsing gRPC status.
  • Fixed OTEL_SPAN_ATTRIBUTE_VALUE_LENGTH_LIMIT not being applied.
  • Fixed baggage and trace headers not respecting the maximum length in some cases.
  • Fixed BaggagePropagator to trim optional whitespace (OWS) around =
    separators when parsing the baggage header.
  • Fixed BaggagePropagator to strip baggage properties from values when
    parsing the baggage header.
  • Fixed OTLP persistent storage clean-up handling for malformed filenames.
  • Fixed resource leak in batch and periodic exporting task workers for Blazor/WASM.
  • Fixed LogRecord.LogLevel to preserve LogLevel.None.
  • Fixed OTEL_TRACES_SAMPLER_ARG handling for out-of-range values.
  • Fixed an issue with OTLP disk retry storage where metrics and logs used the
    traces storage directory.
  • Fixed full OTLP endpoint being logged by internal diagnostics.
  • Improve efficiency of parsing of baggage, B3 and Jaeger propagation headers.
  • Hardened Zipkin exporter memory usage for endpoint caching and array tag
    serialization.

v1.15.2

Release details: 1.15.2

  • Limit how much of the response body is read by the OTLP exporter when
    export fails and error logging is enabled.
  • Added Task-based worker support for BatchExportProcessor and
    PeriodicExportingMetricReader to enable the OpenTelemetry SDK to work
    in single-threaded WebAssembly environments such as Blazor and
    Uno Platform.

v1.15.1

Release details: 1.15.1

  • Breaking change: The Baggage API now disallows empty baggage names and
    treats baggage names and values as case sensitive, aligning with the latest
    Baggage API specification.
  • Various bug fixes across OpenTelemetry.Api and OpenTelemetry SDK,
    including fixes for thread-safety, sampler edge cases, metrics precision,
    and observable instrument lifecycle handling.
StackExchange/StackExchange.Redis (StackExchange.Redis)

v2.12.14

Compare Source

What's Changed

Impact: "high" if using cluster and high-integrity-mode together (resolves an issue that can mis-report -MOVED responses as integrity failures)

NuGet link

New Contributors

Full Changelog: StackExchange/StackExchange.Redis@2.12.8...2.12.14

v2.12.8

Compare Source

What's Changed

Full Changelog: StackExchange/StackExchange.Redis@2.12.4...2.12.8

v2.12.4

Compare Source

What's Changed

Full Changelog: StackExchange/StackExchange.Redis@2.12.1...2.12.4

v2.12.1

Compare Source

What's Changed

Full Changelog: StackExchange/StackExchange.Redis@2.11.8...2.12.1

v2.11.8

Compare Source

What's Changed
New Contributors

Full Changelog: StackExchange/StackExchange.Redis@2.11.3...2.11.8

v2.11.3

Compare Source

What's Changed

Full Changelog: StackExchange/StackExchange.Redis@2.11.0...2.11.3

coverlet-coverage/coverlet (coverlet.collector)

v8.0.1

Fixed
  • Fix [BUG] TypeInitializationException when targeting .NET Framework #​1818
  • Fix [BUG] coverlet.MTP build fails with CS0400 due to developmentDependency=true #​1827
Improvements
  • Additional improvements needed for .NET Framework instrumentation type import #​1825

Diff between 8.0.0 and 8.0.1


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot changed the title chore(deps): update dependency awssdk.core to 3.7.500.81 chore(deps): update nuget packages Feb 17, 2026
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Feb 17, 2026

🔍 Vulnerabilities of dockerhubaneo/armonik_control:0.38.1-renovatenuget.7.sha.e791c2b9

📦 Image Reference dockerhubaneo/armonik_control:0.38.1-renovatenuget.7.sha.e791c2b9
digestsha256:36fdf82ff5a1064a9aab9ad8cea71a2478c2974d3320392132a8f0e8e3d70569
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 0
platformlinux/amd64
size74 MB
packages121
critical: 0 high: 0 medium: 1 low: 0 OpenTelemetry.Exporter.OpenTelemetryProtocol 1.15.0 (nuget)

pkg:nuget/OpenTelemetry.Exporter.OpenTelemetryProtocol@1.15.0

medium 5.3: CVE--2026--40182 Memory Allocation with Excessive Size Value

Affected range>=1.13.1
<1.15.2
Fixed version1.15.2
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Summary

When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memory with no upper-bound on the number of bytes consumed.

This could cause memory exhaustion in the consuming application if the configured back-end/collector endpoint is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response.

Details

open-telemetry/opentelemetry-dotnet#6564 introduced a change to read the response body when a non-200 HTTP status code is received when exporting telemetry to aid debugging by operators so that the error response is included in the logs emitted by the exporter for both gRPC and HTTP/protobuf.

An unintended consequence of this change is that the response body is fully read into memory when received with no upper-bound.

This vulnerability was surfaced during the investigation of GHSA-w8rr-5gcm-pp58.

Impact

If an application using the OTLP exporter is configured to use a back-end/collector endpoint that is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned by the response the application could have its memory exhausted and create a denial-of-service condition.

Mitigation

The application's configured back-end/collector endpoint needs to behave maliciously. If the collector/back-end is a well-behaved implementation response bodies should not be excessively large if a request error occurs.

Workarounds

None known.

Remediation

#7017 updates the OTLP exporter for both gRPC and HTTP to:

@renovate renovate Bot force-pushed the renovate/nuget branch 9 times, most recently from 8e8cd80 to cee7be5 Compare February 24, 2026 14:20
@renovate renovate Bot force-pushed the renovate/nuget branch 3 times, most recently from fdf5317 to 07fe229 Compare March 4, 2026 02:40
@renovate renovate Bot force-pushed the renovate/nuget branch 10 times, most recently from 24e770f to ead2e06 Compare March 13, 2026 01:19
@renovate renovate Bot force-pushed the renovate/nuget branch 5 times, most recently from 3e693dd to 1b44aee Compare March 17, 2026 13:23
@renovate renovate Bot force-pushed the renovate/nuget branch 4 times, most recently from 1f6f253 to c49542a Compare March 25, 2026 17:45
@renovate renovate Bot force-pushed the renovate/nuget branch 3 times, most recently from 4e137c0 to b4885eb Compare April 2, 2026 14:42
@renovate renovate Bot force-pushed the renovate/nuget branch 3 times, most recently from 270504f to 040e69f Compare April 12, 2026 17:20
@renovate renovate Bot force-pushed the renovate/nuget branch 4 times, most recently from 77da2ab to 6783d04 Compare April 21, 2026 11:01
@renovate renovate Bot force-pushed the renovate/nuget branch 3 times, most recently from abc7606 to a92ea34 Compare April 22, 2026 23:35
@renovate renovate Bot force-pushed the renovate/nuget branch from a92ea34 to e791c2b Compare April 23, 2026 22:04
@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants