changelog++
This commit is contained in:
parent
7f7ac71746
commit
2f7c6db9b4
31
CHANGELOG.md
31
CHANGELOG.md
|
@ -14,7 +14,13 @@ BUG FIXES:
|
|||
* secrets/gcp: Ensure that the IAM policy version is appropriately set after a roleset's bindings have changed. [[GH-93](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/93)]
|
||||
|
||||
## 1.5.1
|
||||
### TBD
|
||||
### August 20th, 2020
|
||||
|
||||
SECURITY:
|
||||
|
||||
* When using the IAM AWS Auth Method, under certain circumstances, values Vault uses to validate identities and roles can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.7.1 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16250)
|
||||
* When using the GCP GCE Auth Method, under certain circumstances, values Vault uses to validate GCE VMs can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.8.3 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16251)
|
||||
* When using Vault Agent with cert auto-auth and caching enabled, under certain circumstances, clients without permission to access agent's token may retrieve the token without login credentials. This vulnerability affects Vault Agent 1.1.0 and newer and is fixed in 1.5.1 (CVE-2020-17455)
|
||||
|
||||
CHANGES:
|
||||
|
||||
|
@ -122,7 +128,12 @@ BUG FIXES:
|
|||
* ui: Add and upgrade missing dependencies to resolve a failure with `make static-dist`. [[GH-9277](https://github.com/hashicorp/vault/pull/9371)]
|
||||
|
||||
## 1.4.4
|
||||
### TBD
|
||||
### August 20th, 2020
|
||||
|
||||
SECURITY:
|
||||
|
||||
* When using the IAM AWS Auth Method, under certain circumstances, values Vault uses to validate identities and roles can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.7.1 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16250)
|
||||
* When using the GCP GCE Auth Method, under certain circumstances, values Vault uses to validate GCE VMs can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.8.3 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16251)
|
||||
|
||||
BUG FIXES:
|
||||
|
||||
|
@ -345,6 +356,14 @@ BUG FIXES:
|
|||
* ui: Update CLI to accept empty strings as param value to reset previously-set values
|
||||
* ui: Fix bug where error states don't clear when moving between action tabs on Transit [[GH-8354](https://github.com/hashicorp/vault/pull/8354)]
|
||||
|
||||
## 1.3.8
|
||||
### August 20th, 2002
|
||||
|
||||
SECURITY:
|
||||
|
||||
* When using the IAM AWS Auth Method, under certain circumstances, values Vault uses to validate identities and roles can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.7.1 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16250)
|
||||
* When using the GCP GCE Auth Method, under certain circumstances, values Vault uses to validate GCE VMs can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.8.3 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16251)
|
||||
|
||||
## 1.3.7
|
||||
### July 2nd, 2020
|
||||
|
||||
|
@ -641,6 +660,14 @@ BUG FIXES:
|
|||
* ui: show all active kv v2 secret versions even when `delete_version_after` is configured [[GH-7685](https://github.com/hashicorp/vault/pull/7685)]
|
||||
* ui: Ensure that items in the top navigation link to pages that users have access to [[GH-7590](https://github.com/hashicorp/vault/pull/7590)]
|
||||
|
||||
## 1.2.5
|
||||
### August 20th, 2020
|
||||
|
||||
SECURITY:
|
||||
|
||||
* When using the IAM AWS Auth Method, under certain circumstances, values Vault uses to validate identities and roles can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.7.1 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16250)
|
||||
* When using the GCP GCE Auth Method, under certain circumstances, values Vault uses to validate GCE VMs can be manipulated and bypassed. This vulnerability affects Vault and Vault Enterprise 0.8.3 and newer and is fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1 (CVE-2020-16251)
|
||||
|
||||
## 1.2.4 (November 7th, 2019)
|
||||
|
||||
SECURITY:
|
||||
|
|
Loading…
Reference in New Issue