-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update module github.com/hashicorp/vault to v1.18.1 [security] #248
base: main
Are you sure you want to change the base?
fix(deps): update module github.com/hashicorp/vault to v1.18.1 [security] #248
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
license: 100%
ineffassign: 100%
misspell: 100%
This report was generated using GoGitOps.
e53bbb4
to
718dc0b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
license: 100%
ineffassign: 100%
misspell: 100%
This report was generated using GoGitOps.
718dc0b
to
29fa4df
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
ineffassign: 100%
license: 100%
misspell: 100%
This report was generated using GoGitOps.
29fa4df
to
f9983fa
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
ineffassign: 100%
license: 100%
misspell: 100%
This report was generated using GoGitOps.
f9983fa
to
1908c8f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
license: 100%
ineffassign: 100%
misspell: 100%
This report was generated using GoGitOps.
1908c8f
to
cbd46e6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
license: 100%
ineffassign: 100%
misspell: 100%
This report was generated using GoGitOps.
cbd46e6
to
b573bb1
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GoGitOps Review
Grade: A+ (100.0%)
Files: 27
Issues: 0
gofmt: 100%
go_vet: 100%
gocyclo: 100%
golint: 100%
license: 100%
ineffassign: 100%
misspell: 100%
This report was generated using GoGitOps.
This PR contains the following updates:
v1.14.1
->v1.18.1
GitHub Vulnerability Alerts
CVE-2023-4680
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
CVE-2023-5954
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
CVE-2023-6337
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash.
Fixed in Vault 1.15.4, 1.14.8, 1.13.12.
CVE-2024-2048
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
CVE-2024-2660
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. Fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.
CVE-2024-5798
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.
This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9
CVE-2024-6468
Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.
While this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.
Fixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12
CVE-2024-7594
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.
CVE-2024-9180
A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their privileges to Vault’s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16
CVE-2024-8185
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Release Notes
hashicorp/vault (github.com/hashicorp/vault)
v1.18.1
Compare Source
1.18.1
October 30, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
v1.18.0
Compare Source
CHANGES:
when querying the activity log endpoints. [GH-27350]
will automatically be set the billing period start date. [GH-27426]
sudo
ACL capability. [GH-27846]start_time
andend_time
. [GH-28064]The endTime will be set to the end of the current month. This applies to /sys/internal/counters/activity,
/sys/internal/counters/activity/export, and the vault operator usage command that utilizes /sys/internal/counters/activity. [GH-27379]
-dev-three-node
and-dev-four-cluster
CLI options have been removed. [GH-27578]control group: could not find token
, andcontrol group: token is not a valid control group token
.allow_empty_principals
to allow keys or certs to apply to any user/principal. [GH-28466]FEATURES:
session tags when generating temporary credentials using the AWS secrets
engine. [GH-27620]
for write requests as a GA feature (enabled by default) for Integrated Storage.
with only core features using the BUILD_MINIMAL environment variable. [GH-27394]
IMPROVEMENTS:
visibly sensible totals. [GH-27547]
X-Vault-Namespace
header or within the path) and all child namespaces. [GH-27846]/sys/internal/counters/activity
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]log before returning (if there are errors to log, and the context is done). [GH-27859]
eviction, and avoid duplicate loading during multiple simultaneous logins on
the same role. [GH-27902]
--dev-no-kv
flag to prevent auto mounting a key-value secret backend when running a dev server [GH-16974]vault operator usage
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]disable_host_initial_lookup
option to backend, allowing the disabling of initial host lookup. [GH-9733]service_meta
config field. [GH-11084]GetMSIEndpoint
, which supports more than just the metadata service. [GH-10624]vault/settings/secrets/configure/<backend>
tovault/secrets/<backend>/configuration/edit
[GH-27918]current_billing_period
from dashboard activity log request [GH-27559]BUG FIXES:
max_lease_ttl
tune value for tokens created viaauth/token/create
. [GH-28498]-address
not being set when it is. [GH-27265]vault hcp connect
where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]vault secrets move
andvault auth move
command will no longer attempt to write to storage on performance standby nodes. [GH-28059]setting of 'deny_unauthorized' [GH-27459]
sys/internal/ui/mounts
for a mount prefixed by a namespace path when path filters are configured. [GH-27939]is cancelled and will now use a new context with a 5 second timeout.
If the existing context is cancelled a new context, will be used. [GH-27531]
proxy_protocol_behavior
withdeny_unauthorized
,which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]
allow_forwarding_via_header
to be configured on the cluster. [GH-27891]//
) in the mount path, when the token should otherwise have access.app_name
andinstallation_id
are setuse versioned plugins. [GH-27881]
default_role
input missing from oidc auth method configuration form [GH-28539]v1.17.6
Compare Source
1.17.6
September 25, 2024
CHANGES:
allow_empty_principals
to allow keys or certs to apply to any user/principal. [GH-28466]IMPROVEMENTS:
current_billing_period
from dashboard activity log request [GH-27559]BUG FIXES:
app_name
andinstallation_id
are setv1.17.5
Compare Source
1.17.5
August 30, 2024
SECURITY:
core/audit: fix regression where client tokens and token accessors were being
displayed in the audit log in plaintext HCSEC-2024-18
BUG FIXES:
v1.17.4
Compare Source
1.17.4
August 29, 2024
CHANGES:
IMPROVEMENTS:
visibly sensible totals. [GH-27547]
/sys/internal/counters/activity
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]vault operator usage
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]BUG FIXES:
vault secrets move
andvault auth move
command will no longer attempt to write to storage on performance standby nodes. [GH-28059]v1.17.3
Compare Source
1.17.3
August 07, 2024
CHANGES:
IMPROVEMENTS:
log before returning (if there are errors to log, and the context is done). [GH-27859]
eviction, and avoid duplicate loading during multiple simultaneous logins on
the same role. [GH-27902]
BUG FIXES:
sys/internal/ui/mounts
for a mount prefixed by a namespace path when path filters are configured. [GH-27939]allow_forwarding_via_header
to be configured on the cluster. [GH-27891]use versioned plugins. [GH-27881]
v1.17.2
Compare Source
1.17.2
July 10, 2024
CHANGES:
FEATURES:
session tags when generating temporary credentials using the AWS secrets
engine. [GH-27620]
BUG FIXES:
vault hcp connect
where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]proxy_protocol_behavior
withdeny_unauthorized
,which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]
v1.17.1
Compare Source
1.17.1
June 26, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
setting of 'deny_unauthorized' [GH-27459]
is cancelled and will now use a new context with a 5 second timeout.
If the existing context is cancelled a new context, will be used. [GH-27531]
v1.17.0
Compare Source
1.17.0
June 12, 2024
CHANGES:
are present in the incoming request. By default they are not HMAC'ed (but can be configured to HMAC by Vault Operators). [GH-26777]
enable_multiseal
in configuration.exceeded the number of uses, or is a bogus value [GH-25953]
namespace
label on thevault.kmse.key.count
metric.Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.