Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump github.com/hashicorp/vault from 1.15.2 to 1.15.4 #589

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 12, 2023

Bumps github.com/hashicorp/vault from 1.15.2 to 1.15.4.

Release notes

Sourced from github.com/hashicorp/vault's releases.

v1.15.4

1.15.4

SECURITY:

  • core: Fixes an issue present in both Vault and Vault Enterprise since Vault 1.12.0, where Vault is vulnerable to a denial of service through memory exhaustion of the host when handling large HTTP requests from a client. Upgrading is strongly recommended.(see CVE-2023-6337 & HCSEC-2023-34)

CHANGES:

  • identity (enterprise): POST requests to the /identity/entity/merge endpoint are now always forwarded from standbys to the active node. [GH-24325](hashicorp/vault#24325)

BUG FIXES:

v1.15.3

1.15.3

November 30, 2023

CHANGES:

  • core: Bump Go version to 1.21.4.

IMPROVEMENTS:

  • core (enterprise): Speed up unseal when using namespaces
  • core: update sys/seal-status (and CLI vault status) to report the type of the seal when unsealed, as well as the type of the recovery seal if an auto-seal. [GH-23022]
  • secrets/pki: do not check TLS validity on ACME requests redirected to https [GH-22521]
  • ui: Sort list view of entities and aliases alphabetically using the item name [GH-24103]
  • ui: capabilities-self is always called in the user's root namespace [GH-24168]

BUG FIXES:

  • activity log (enterprise): De-duplicate client count estimates for license utilization reporting.
  • auth/cert: Handle errors related to expired OCSP server responses [GH-24193]
  • core (Enterprise): Treat multiple disabled HA seals as a migration to Shamir.
  • core/audit: Audit logging a Vault response will now use a 5 second context timeout, separate from the original request. [GH-24238]
  • core/config: Use correct HCL config value when configuring log_requests_level. [GH-24059]
  • core/quotas: Close rate-limit blocked client purge goroutines when sealing [GH-24108]
  • core: Fix an error that resulted in the wrong seal type being returned by sys/seal-status while Vault is in seal migration mode. [GH-24165]
  • replication (enterprise): disallow configuring paths filter for a mount path that does not exist
  • secrets-sync (enterprise): Fix panic when setting usage_gauge_period to none

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault's changelog.

1.15.4

December 06, 2023

SECURITY:

  • core: Fixes an issue present in both Vault and Vault Enterprise since Vault 1.12.0, where Vault is vulnerable to a denial of service through memory exhaustion of the host when handling large HTTP requests from a client. (see CVE-2023-6337 & HCSEC-2023-34)

CHANGES:

  • identity (enterprise): POST requests to the /identity/entity/merge endpoint are now always forwarded from standbys to the active node. [GH-24325]

BUG FIXES:

  • agent/logging: Agent should now honor correct -log-format and -log-file settings in logs generated by the consul-template library. [GH-24252]
  • api: Fix deadlock on calls to sys/leader with a namespace configured on the request. [GH-24256]
  • core: Fix a timeout initializing Vault by only using a short timeout persisting barrier keyring encryption counts. [GH-24336]
  • ui: Correctly handle directory redirects from pre 1.15.0 Kv v2 list view urls. [GH-24281]
  • ui: Fix payload sent when disabling replication [GH-24292]
  • ui: When Kv v2 secret is an object, fix so details view defaults to readOnly JSON editor. [GH-24290]

1.15.3

November 30, 2023

CHANGES:

  • core: Bump Go version to 1.21.4.

IMPROVEMENTS:

  • core (enterprise): Speed up unseal when using namespaces
  • core: update sys/seal-status (and CLI vault status) to report the type of the seal when unsealed, as well as the type of the recovery seal if an auto-seal. [GH-23022]
  • secrets/pki: do not check TLS validity on ACME requests redirected to https [GH-22521]
  • ui: Sort list view of entities and aliases alphabetically using the item name [GH-24103]
  • ui: capabilities-self is always called in the user's root namespace [GH-24168]

BUG FIXES:

  • activity log (enterprise): De-duplicate client count estimates for license utilization reporting.
  • auth/cert: Handle errors related to expired OCSP server responses [GH-24193]
  • core (Enterprise): Treat multiple disabled HA seals as a migration to Shamir.
  • core/audit: Audit logging a Vault response will now use a 5 second context timeout, separate from the original request. [GH-24238]
  • core/config: Use correct HCL config value when configuring log_requests_level. [GH-24059]
  • core/quotas: Close rate-limit blocked client purge goroutines when sealing [GH-24108]
  • core: Fix an error that resulted in the wrong seal type being returned by sys/seal-status while Vault is in seal migration mode. [GH-24165]
  • replication (enterprise): disallow configuring paths filter for a mount path that does not exist

... (truncated)

Commits
  • 9b61934 Buffer body read up to MaxRequestSize (#24354) (#24369)
  • c5c7c98 backport of commit 9e063f31d7c29481c6b3d632947ed7a58017a5da (#24370)
  • 1e61209 Cherry pick license updates from main (#24348)
  • f42d508 Backport 1.15.x: For showing JSON editor for complex secret in KV details vie...
  • cb87bc1 backport of commit 91ec1a788b46c0bf12a3351e5e3339474400eee9 (#24350)
  • 87c8f7c backport of commit 4a7bee5a02db880d543692386ccd597f33e29624 (#24330)
  • 818455b backport of commit 18e6385e0589895c354e0d2aed95e8321f1ee84f (#24327)
  • fe83861 backport of commit 06b9325bb9e6616789c4fe5e7778459ba98a14ab (#24323)
  • b686de3 Bumped product version to 1.15.4.
  • fc57356 backport of commit 9ddc33ab98c2c4f5a6cf875bea0457525a15cc76 (#24311)
  • Additional commits viewable in compare view

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot requested review from werne2j and jkayani as code owners December 12, 2023 00:53
@dependabot dependabot bot added dependencies Updating dependencies go Pull requests that update Go code labels Dec 12, 2023
Bumps [github.com/hashicorp/vault](https://github.com/hashicorp/vault) from 1.15.2 to 1.15.4.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md)
- [Commits](hashicorp/vault@v1.15.2...v1.15.4)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/hashicorp/vault-1.15.4 branch from 6d60091 to d0bbb63 Compare January 3, 2024 01:26
Copy link
Contributor Author

dependabot bot commented on behalf of github Feb 1, 2024

Superseded by #603.

@dependabot dependabot bot closed this Feb 1, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/hashicorp/vault-1.15.4 branch February 1, 2024 20:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Updating dependencies go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants