-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update module github.com/hashicorp/vault to v1.18.1 [SECURITY] #77
Merged
xbglowx
merged 1 commit into
main
from
renovate/go-github.com-hashicorp-vault-vulnerability
Feb 15, 2025
Merged
Update module github.com/hashicorp/vault to v1.18.1 [SECURITY] #77
xbglowx
merged 1 commit into
main
from
renovate/go-github.com-hashicorp-vault-vulnerability
Feb 15, 2025
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
b813b1a
to
f125fcc
Compare
f125fcc
to
4ac9659
Compare
4ac9659
to
acd2907
Compare
acd2907
to
3fc8ff2
Compare
3fc8ff2
to
1b35427
Compare
1b35427
to
59478d8
Compare
xbglowx
approved these changes
Feb 15, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.15.3
->v1.18.1
GitHub Vulnerability Alerts
CVE-2023-6337
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash.
Fixed in Vault 1.15.4, 1.14.8, 1.13.12.
CVE-2024-0831
Vault and Vault Enterprise (“Vault”) may expose sensitive information when enabling an audit device which specifies the
log_raw
option, which may log sensitive information to other audit devices, regardless of whether they are configured to uselog_raw
CVE-2024-2048
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
CVE-2024-2660
Vault and Vault Enterprise TLS certificates auth method did not correctly validate OCSP responses when one or more OCSP sources were configured. Fixed in Vault 1.16.0 and Vault Enterprise 1.16.1, 1.15.7, and 1.14.11.
CVE-2024-5798
Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.
This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9
CVE-2024-6468
Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.
While this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.
Fixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12
CVE-2024-7594
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.
CVE-2024-9180
A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their privileges to Vault’s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16
CVE-2024-8185
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint. An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.
This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Release Notes
hashicorp/vault (github.com/hashicorp/vault)
v1.18.1
Compare Source
1.18.1
October 30, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
v1.18.0
Compare Source
CHANGES:
when querying the activity log endpoints. [GH-27350]
will automatically be set the billing period start date. [GH-27426]
sudo
ACL capability. [GH-27846]start_time
andend_time
. [GH-28064]The endTime will be set to the end of the current month. This applies to /sys/internal/counters/activity,
/sys/internal/counters/activity/export, and the vault operator usage command that utilizes /sys/internal/counters/activity. [GH-27379]
-dev-three-node
and-dev-four-cluster
CLI options have been removed. [GH-27578]control group: could not find token
, andcontrol group: token is not a valid control group token
.allow_empty_principals
to allow keys or certs to apply to any user/principal. [GH-28466]FEATURES:
session tags when generating temporary credentials using the AWS secrets
engine. [GH-27620]
for write requests as a GA feature (enabled by default) for Integrated Storage.
with only core features using the BUILD_MINIMAL environment variable. [GH-27394]
IMPROVEMENTS:
visibly sensible totals. [GH-27547]
X-Vault-Namespace
header or within the path) and all child namespaces. [GH-27846]/sys/internal/counters/activity
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]log before returning (if there are errors to log, and the context is done). [GH-27859]
eviction, and avoid duplicate loading during multiple simultaneous logins on
the same role. [GH-27902]
--dev-no-kv
flag to prevent auto mounting a key-value secret backend when running a dev server [GH-16974]vault operator usage
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]disable_host_initial_lookup
option to backend, allowing the disabling of initial host lookup. [GH-9733]service_meta
config field. [GH-11084]GetMSIEndpoint
, which supports more than just the metadata service. [GH-10624]vault/settings/secrets/configure/<backend>
tovault/secrets/<backend>/configuration/edit
[GH-27918]current_billing_period
from dashboard activity log request [GH-27559]BUG FIXES:
max_lease_ttl
tune value for tokens created viaauth/token/create
. [GH-28498]-address
not being set when it is. [GH-27265]vault hcp connect
where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]vault secrets move
andvault auth move
command will no longer attempt to write to storage on performance standby nodes. [GH-28059]setting of 'deny_unauthorized' [GH-27459]
sys/internal/ui/mounts
for a mount prefixed by a namespace path when path filters are configured. [GH-27939]is cancelled and will now use a new context with a 5 second timeout.
If the existing context is cancelled a new context, will be used. [GH-27531]
proxy_protocol_behavior
withdeny_unauthorized
,which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]
allow_forwarding_via_header
to be configured on the cluster. [GH-27891]//
) in the mount path, when the token should otherwise have access.app_name
andinstallation_id
are setuse versioned plugins. [GH-27881]
default_role
input missing from oidc auth method configuration form [GH-28539]v1.17.6
Compare Source
1.17.6
September 25, 2024
CHANGES:
allow_empty_principals
to allow keys or certs to apply to any user/principal. [GH-28466]IMPROVEMENTS:
current_billing_period
from dashboard activity log request [GH-27559]BUG FIXES:
app_name
andinstallation_id
are setv1.17.5
Compare Source
1.17.5
August 30, 2024
SECURITY:
core/audit: fix regression where client tokens and token accessors were being
displayed in the audit log in plaintext HCSEC-2024-18
BUG FIXES:
v1.17.4
Compare Source
1.17.4
August 29, 2024
CHANGES:
IMPROVEMENTS:
visibly sensible totals. [GH-27547]
/sys/internal/counters/activity
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]vault operator usage
will now include a warning if the specified usage period contains estimated client counts. [GH-28068]BUG FIXES:
vault secrets move
andvault auth move
command will no longer attempt to write to storage on performance standby nodes. [GH-28059]v1.17.3
Compare Source
1.17.3
August 07, 2024
CHANGES:
IMPROVEMENTS:
log before returning (if there are errors to log, and the context is done). [GH-27859]
eviction, and avoid duplicate loading during multiple simultaneous logins on
the same role. [GH-27902]
BUG FIXES:
sys/internal/ui/mounts
for a mount prefixed by a namespace path when path filters are configured. [GH-27939]allow_forwarding_via_header
to be configured on the cluster. [GH-27891]use versioned plugins. [GH-27881]
v1.17.2
Compare Source
1.17.2
July 10, 2024
CHANGES:
FEATURES:
session tags when generating temporary credentials using the AWS secrets
engine. [GH-27620]
BUG FIXES:
vault hcp connect
where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]proxy_protocol_behavior
withdeny_unauthorized
,which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]
v1.17.1
Compare Source
1.17.1
June 26, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
setting of 'deny_unauthorized' [GH-27459]
is cancelled and will now use a new context with a 5 second timeout.
If the existing context is cancelled a new context, will be used. [GH-27531]
v1.17.0
Compare Source
1.17.0
June 12, 2024
CHANGES:
are present in the incoming request. By default they are not HMAC'ed (but can be configured to HMAC by Vault Operators). [GH-26777]
enable_multiseal
in configuration.exceeded the number of uses, or is a bogus value [GH-25953]
namespace
label on thevault.kmse.key.count
metric.Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.