build(deps): bump github.com/hashicorp/vault from 1.14.1 to 1.14.8
Bumps github.com/hashicorp/vault from 1.14.1 to 1.14.8.
Release notes
Sourced from github.com/hashicorp/vault's releases.
v1.14.8
1.14.8
SECURITY:
- core: Fixes an issue present in both Vault and Vault Enterprise since Vault 1.12.0, where Vault is vulnerable to a denial of service through memory exhaustion of the host when handling large HTTP requests from a client. Upgrading is strongly recommended.(see CVE-2023-6337 & HCSEC-2023-34)
CHANGES:
- identity (enterprise): POST requests to the /identity/entity/merge endpoint are now always forwarded from standbys to the active node. [GH-24325](hashicorp/vault#24325)
BUG FIXES:
- agent/logging: Agent should now honor correct -log-format and -log-file settings in logs generated by the consul-template library. [GH-24252](hashicorp/vault#24252)
- api: Fix deadlock on calls to sys/leader with a namespace configured on the request. [GH-24256](hashicorp/vault#24256)
- core: Fix a timeout initializing Vault by only using a short timeout persisting barrier keyring encryption counts. [GH-24336](hashicorp/vault#24336)
- ui: Fix payload sent when disabling replication [GH-24292](hashicorp/vault#24292)
v1.14.7
1.14.7
November 30, 2023
CHANGES:
- core: Bump Go version to 1.20.11.
IMPROVEMENTS:
- core (enterprise): Speed up unseal when using namespaces
- secrets/pki: do not check TLS validity on ACME requests redirected to https [GH-22521]
- ui: Sort list view of entities and aliases alphabetically using the item name [GH-24103]
- ui: Update flat, shell-quote and swagger-ui-dist packages. Remove swagger-ui styling overrides. [GH-23700]
BUG FIXES:
- activity log (enterprise): De-duplicate client count estimates for license utilization reporting.
- auth/cert: Handle errors related to expired OCSP server responses [GH-24193]
- core/config: Use correct HCL config value when configuring
log_requests_level. [GH-24058]- core/quotas: Close rate-limit blocked client purge goroutines when sealing [GH-24108]
- replication (enterprise): disallow configuring paths filter for a mount path that does not exist
- secrets/pki: Do not set nextUpdate field in OCSP responses when ocsp_expiry is 0 [GH-24192]
- secrets/transit: Fix a panic when attempting to export a public RSA key [GH-24054]
- ui: Fix error when tuning token auth configuration within namespace [GH-24147]
v1.14.6
1.14.6
November 09, 2023
SECURITY:
- core: inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. This vulnerability, CVE-2023-5954, was introduced in Vault 1.15.0, 1.14.3, and 1.13.7, and is fixed in Vault 1.15.2, 1.14.6, and 1.13.10. [HSEC-2023-33]
... (truncated)
Changelog
Sourced from github.com/hashicorp/vault's changelog.
1.14.8
December 06, 2023
SECURITY:
- core: Fixes an issue present in both Vault and Vault Enterprise since Vault 1.12.0, where Vault is vulnerable to a denial of service through memory exhaustion of the host when handling large HTTP requests from a client. (see CVE-2023-6337 & HCSEC-2023-34)
CHANGES:
- identity (enterprise): POST requests to the
/identity/entity/mergeendpoint are now always forwarded from standbys to the active node. [GH-24325]BUG FIXES:
- agent/logging: Agent should now honor correct -log-format and -log-file settings in logs generated by the consul-template library. [GH-24252]
- api: Fix deadlock on calls to sys/leader with a namespace configured on the request. [GH-24256]
- core: Fix a timeout initializing Vault by only using a short timeout persisting barrier keyring encryption counts. [GH-24336]
- ui: Fix payload sent when disabling replication [GH-24292]
1.14.7
November 30, 2023
CHANGES:
- core: Bump Go version to 1.20.11.
IMPROVEMENTS:
- core (enterprise): Speed up unseal when using namespaces
- secrets/pki: do not check TLS validity on ACME requests redirected to https [GH-22521]
- ui: Sort list view of entities and aliases alphabetically using the item name [GH-24103]
- ui: Update flat, shell-quote and swagger-ui-dist packages. Remove swagger-ui styling overrides. [GH-23700]
BUG FIXES:
- activity log (enterprise): De-duplicate client count estimates for license utilization reporting.
- auth/cert: Handle errors related to expired OCSP server responses [GH-24193]
- core/config: Use correct HCL config value when configuring
log_requests_level. [GH-24058]- core/quotas: Close rate-limit blocked client purge goroutines when sealing [GH-24108]
- replication (enterprise): disallow configuring paths filter for a mount path that does not exist
- secrets/pki: Do not set nextUpdate field in OCSP responses when ocsp_expiry is 0 [GH-24192]
- secrets/transit: Fix a panic when attempting to export a public RSA key [GH-24054]
- ui: Fix error when tuning token auth configuration within namespace [GH-24147]
1.14.6
November 09, 2023
SECURITY:
- core: inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. This vulnerability, CVE-2023-5954, was introduced in Vault 1.15.0, 1.14.3, and 1.13.7, and is fixed in Vault 1.15.2, 1.14.6, and 1.13.10. [HSEC-2023-33]
... (truncated)
Commits
446f213Buffer body read up to MaxRequestSize (#24354) (#24367)3e26f82backport of commit 91ec1a788b46c0bf12a3351e5e3339474400eee9 (#24363)b87d348backport of commit 4a7bee5a02db880d543692386ccd597f33e29624 (#24331)9f23d72backport of commit 18e6385e0589895c354e0d2aed95e8321f1ee84f (#24328)ec654e3Backport of fix-log-fileso that it uses the correct name and only adds ti...a75de0eBumped product version to 1.14.8.28eff53backport of UI: prevent replication disable action from sending payload (#24296)46bcae6backport of commit 64dfff080a658890a4eb7924fd465e20d71c386a (#24285)44fdf3bbackport of commit c329ed8d3b02b92dfded30065317c82648d3cae3 (#24260)557bb7eupdate go-jose dep (#24233)- Additional commits viewable in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Note Automatic rebases have been disabled on this pull request as it has been open for over 30 days.
Quality Gate passed
Kudos, no new issues were introduced!
0 New issues
0 Security Hotspots
No data about Coverage
No data about Duplication
Thank you for your contribution! This pull request is stale because it has been open 60 days with no activity. In order to keep it open, please remove stale label or add a comment within the next 10 days. If you need a Piper team member to remove the stale label make sure to add @SAP/jenkins-library-team to your comment.
Pull request got stale and no further activity happened. It has automatically been closed. Please re-open in case you still consider it relevant.
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version.
If you change your mind, just re-open this PR and I'll resolve any conflicts on it.