pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/vault
Module Name: pkgsrc
Committed By: he
Date: Mon Feb 1 10:49:11 UTC 2021
Modified Files:
pkgsrc/security/vault: Makefile distinfo
Log Message:
Upgrade security/vault to version 1.6.2:
Pkgsrc changes:
* None
Upstream changes:
v1.6.2
January 29, 2021
SECURITY:
* IP Address Disclosure: We fixed a vulnerability where, under
some error conditions, Vault would return an error message
disclosing internal IP addresses. This vulnerability affects
Vault and Vault Enterprise and is fixed in 1.6.2 (CVE-2021-3024).
* Limited Unauthenticated Remove Peer: As of Vault 1.6, the
remove-peer command on DR secondaries did not require authentication.
This issue impacts the stability of HA architecture, as a bad
actor could remove all standby nodes from a DR secondary. This
issue affects Vault Enterprise 1.6.0 and 1.6.1, and is fixed in
1.6.2 (CVE-2021-3282).
* Mount Path Disclosure: Vault previously returned different HTTP
status codes for existent and non-existent mount paths. This
behavior would allow unauthenticated brute force attacks to
reveal which paths had valid mounts. This issue affects Vault
and Vault Enterprise and is fixed in 1.6.2 (CVE-2020-25594).
CHANGES:
* go: Update go version to 1.15.7 [GH-10730]
FEATURES:
* ui: Adds check for feature flag on application, and updates
namespace toolbar on login if present [GH-10588]
IMPROVEMENTS:
* core (enterprise): "vault status" command works when a namespace
is set. [GH-10725]
* core: reduce memory used by leases [GH-10726]
* storage/raft (enterprise): Listing of peers is now allowed on DR secondary
cluster nodes, as an update operation that takes in DR operation token for
authenticating the request.
BUG FIXES:
* agent: Set namespace for template server in agent. [GH-10757]
* core: Make the response to an unauthenticated request to
sys/internal endpoints consistent regardless of mount existence.
[GH-10650]
* metrics: Protect emitMetrics from panicking during post-seal [GH-10708]
* secrets/gcp: Fix issue with account and iam_policy roleset WALs
not being removed after attempts when GCP project no longer
exists [GH-10759]
* storage/raft (enterprise): Automated snapshots with Azure required
specifying
* azure_blob_environment, which should have had as a default
AZUREPUBLICCLOUD.
* storage/raft (enterprise): Autosnapshots config and storage
weren't excluded from
* performance replication, causing conflicts and errors.
* ui: Fix bug that double encodes secret route when there are
spaces in the path and makes you unable to view the version
history. [GH-10596]
* ui: Fix expected response from feature-flags endpoint [GH-10684]
To generate a diff of this commit:
cvs rdiff -u -r1.61 -r1.62 pkgsrc/security/vault/Makefile
cvs rdiff -u -r1.25 -r1.26 pkgsrc/security/vault/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/vault/Makefile
diff -u pkgsrc/security/vault/Makefile:1.61 pkgsrc/security/vault/Makefile:1.62
--- pkgsrc/security/vault/Makefile:1.61 Sat Jan 23 14:23:10 2021
+++ pkgsrc/security/vault/Makefile Mon Feb 1 10:49:11 2021
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.61 2021/01/23 14:23:10 bsiegert Exp $
+# $NetBSD: Makefile,v 1.62 2021/02/01 10:49:11 he Exp $
-DISTNAME= vault-1.6.1
-PKGREVISION= 1
+DISTNAME= vault-1.6.2
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
Index: pkgsrc/security/vault/distinfo
diff -u pkgsrc/security/vault/distinfo:1.25 pkgsrc/security/vault/distinfo:1.26
--- pkgsrc/security/vault/distinfo:1.25 Tue Jan 5 11:02:51 2021
+++ pkgsrc/security/vault/distinfo Mon Feb 1 10:49:11 2021
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.25 2021/01/05 11:02:51 he Exp $
+$NetBSD: distinfo,v 1.26 2021/02/01 10:49:11 he Exp $
-SHA1 (vault-1.6.1.tar.gz) = 07853752d3b1a63f6b379a75b950ebdcb976da3d
-RMD160 (vault-1.6.1.tar.gz) = 649f268fda28ac0b4e1d092e984898b957e6e14e
-SHA512 (vault-1.6.1.tar.gz) = 3dd272b5ca6b2858ab9c65a1abcf25bfd01d554c8f8c380ab1384c216bf14f9719ae0947f764cd7a08688899b7e5805e3ce2a96086772035abe54012b5f4ea72
-Size (vault-1.6.1.tar.gz) = 39080880 bytes
+SHA1 (vault-1.6.2.tar.gz) = eb57f9724b8c6c46012052d34932aa6c3ba1a1ad
+RMD160 (vault-1.6.2.tar.gz) = 62e20ba17e1155f2536d2eab5eb2b805dec9c1dc
+SHA512 (vault-1.6.2.tar.gz) = 4269778efebbf45bb56d902eb800a8e66dbf4569ae67eb422da33d0df149bb133c86940e29ed4d2d14bc89065ec7814912e04ab9024bfbc2ef125c1f46796c9a
+Size (vault-1.6.2.tar.gz) = 39088821 bytes
SHA1 (patch-scripts_gen__openapi.sh) = 1ad66480ef135adec05f58b088440e0bec6b4ab8
SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 86d985a6aac6b0eaaf6bdc3b1e4a7e2d17454a6a
SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 09c2f699b37fcb2ea05ca0df270359426a0629b7
Home |
Main Index |
Thread Index |
Old Index