Microsoft was able to delete some of our packages without notice - what's the explanation? #14413
Replies: 8 comments 23 replies
-
|
Interestingly enough https://www.nuget.org/packages/Microsoft.Identity.Client/4.72.1 is deprecated and shows the warning (deprecation message)
So that's why I have been seeing new spell check PRs in that repo like Update: Azure.Identity.Broker that was released ~4 hours ago calls out a security fix in its release https://github.com/Azure/azure-sdk-for-net/releases/tag/Azure.Identity.Broker_1.2.1
So strange that there's an inconsistency with the release note for Azure.Identity.
Update4: I think this part of the deprecation message
Is what's causing the real impact, presumably the definitions of some AV was updated (much?) later than 20:th of May when the fixed version of
Hopefully we can be told which AV's and when their definitions were updated. |
Beta Was this translation helpful? Give feedback.
-
|
What a terrible bad idea this was... So for the sake of the trustworthiness of the ecosystem they decided in my case (a Cake addin) to break existing build pipelines. Because of a typo in an XML comment, in a dependency of a dependency of a dependency 🤷 |
Beta Was this translation helpful? Give feedback.
-
|
We acknowledge that some package deletions have occurred and are actively investigating what led to this action. We understand the importance of package availability and the trust you place in NuGet as a distribution platform. We are committed to transparency and will provide a more detailed update early next week. We are currently restoring affected package versions. If you are an affected package author and need immediate assistance, please contact us at [email protected]. Thank you for your patience while we continue to look into this. -The NuGet Team |
Beta Was this translation helpful? Give feedback.
-
|
A quick note on progress: We have already restored packages removed on July 9th & 10th and are working on restoring the rest as quickly as possible. Current ETA is end of tomorrow. Please see https://status.nuget.org/ for further updates. We'll provide a more detailed report later this week. -NuGet team |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
Seems one maintainer received an email apology very recently serilog-mssql/serilog-sinks-mssqlserver#624 (comment)
|
Beta Was this translation helpful? Give feedback.
-
|
I created a feature request here #14425 for allowing you to check if any package in your dependency graph has been deleted. By adding a new command
|
Beta Was this translation helpful? Give feedback.
-
|
After fully restoring the deleted packages, we have published a detailed update from the Root Cause Analysis/Postmortem. Our sincere thanks for your input, patience and understanding. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Full version here: https://aaronstannard.com/microsoft-delete-nuget-packages/
TL;DR version:
We received this email to our NuGet administrator email addresses yesterday morning
Email mentions a vulnerability in Microsoft.Identity.Client and that some recent package versions of ours were impacted by it.
We discover later, when trying to build one of those projects, that both of those affected package versions were hard-deleted from NuGet.org.
We absolutely didn't delete them ourselves, and we're not the only affected authors: https://x.com/spin973/status/1943714651964915882
NuGet makes it very, very had to delete packages on-purpose - in order to avoid
left-pad-style issues. Why did Microsoft bypass the normal CVE procedure on NuGet and hard-delete third party packages? What's the limiting principle at work here? And why was this CVE (a typo in an XML-DOC comment, come on) so urgent that it merited this extraordinary work-around?I depend on NuGet to distribute my intellectual property to my customers - the indefinite availability of packages is an essential part of that guarantee. Will my packages be arbitrarily deleted again in the future without any notice the next time a Microsoft team introduces a severe vulnerability in their code?
Beta Was this translation helpful? Give feedback.
All reactions