pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/vault Upgrade security/vault to version 1.6.2:



details:   https://anonhg.NetBSD.org/pkgsrc/rev/a2b535a6da2a
branches:  trunk
changeset: 445936:a2b535a6da2a
user:      he <he%pkgsrc.org@localhost>
date:      Mon Feb 01 10:49:11 2021 +0000

description:
Upgrade security/vault to version 1.6.2:

Pkgsrc changes:
 * None

Upstream changes:

v1.6.2
January 29, 2021

SECURITY:
 * IP Address Disclosure: We fixed a vulnerability where, under
   some error conditions, Vault would return an error message
   disclosing internal IP addresses. This vulnerability affects
   Vault and Vault Enterprise and is fixed in 1.6.2 (CVE-2021-3024).
 * Limited Unauthenticated Remove Peer: As of Vault 1.6, the
   remove-peer command on DR secondaries did not require authentication.
   This issue impacts the stability of HA architecture, as a bad
   actor could remove all standby nodes from a DR secondary. This
   issue affects Vault Enterprise 1.6.0 and 1.6.1, and is fixed in
   1.6.2 (CVE-2021-3282).
 * Mount Path Disclosure: Vault previously returned different HTTP
   status codes for existent and non-existent mount paths. This
   behavior would allow unauthenticated brute force attacks to
   reveal which paths had valid mounts. This issue affects Vault
   and Vault Enterprise and is fixed in 1.6.2 (CVE-2020-25594).

CHANGES:
 * go: Update go version to 1.15.7 [GH-10730]

FEATURES:
 * ui: Adds check for feature flag on application, and updates
   namespace toolbar on login if present [GH-10588]

IMPROVEMENTS:
 * core (enterprise): "vault status" command works when a namespace
   is set. [GH-10725]
 * core: reduce memory used by leases [GH-10726]
 * storage/raft (enterprise): Listing of peers is now allowed on DR secondary
   cluster nodes, as an update operation that takes in DR operation token for
   authenticating the request.

BUG FIXES:
 * agent: Set namespace for template server in agent. [GH-10757]
 * core: Make the response to an unauthenticated request to
   sys/internal endpoints consistent regardless of mount existence.
   [GH-10650]
 * metrics: Protect emitMetrics from panicking during post-seal [GH-10708]
 * secrets/gcp: Fix issue with account and iam_policy roleset WALs
   not being removed after attempts when GCP project no longer
   exists [GH-10759]
 * storage/raft (enterprise): Automated snapshots with Azure required
   specifying
 * azure_blob_environment, which should have had as a default
   AZUREPUBLICCLOUD.
 * storage/raft (enterprise): Autosnapshots config and storage
   weren't excluded from
 * performance replication, causing conflicts and errors.
 * ui: Fix bug that double encodes secret route when there are
   spaces in the path and makes you unable to view the version
   history. [GH-10596]
 * ui: Fix expected response from feature-flags endpoint [GH-10684]

diffstat:

 security/vault/Makefile |   5 ++---
 security/vault/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 8 deletions(-)

diffs (31 lines):

diff -r e517ff2d12f2 -r a2b535a6da2a security/vault/Makefile
--- a/security/vault/Makefile   Mon Feb 01 10:48:37 2021 +0000
+++ b/security/vault/Makefile   Mon Feb 01 10:49:11 2021 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.61 2021/01/23 14:23:10 bsiegert Exp $
+# $NetBSD: Makefile,v 1.62 2021/02/01 10:49:11 he Exp $
 
-DISTNAME=      vault-1.6.1
-PKGREVISION=   1
+DISTNAME=      vault-1.6.2
 CATEGORIES=    security
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=hashicorp/}
 
diff -r e517ff2d12f2 -r a2b535a6da2a security/vault/distinfo
--- a/security/vault/distinfo   Mon Feb 01 10:48:37 2021 +0000
+++ b/security/vault/distinfo   Mon Feb 01 10:49:11 2021 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.25 2021/01/05 11:02:51 he Exp $
+$NetBSD: distinfo,v 1.26 2021/02/01 10:49:11 he Exp $
 
-SHA1 (vault-1.6.1.tar.gz) = 07853752d3b1a63f6b379a75b950ebdcb976da3d
-RMD160 (vault-1.6.1.tar.gz) = 649f268fda28ac0b4e1d092e984898b957e6e14e
-SHA512 (vault-1.6.1.tar.gz) = 3dd272b5ca6b2858ab9c65a1abcf25bfd01d554c8f8c380ab1384c216bf14f9719ae0947f764cd7a08688899b7e5805e3ce2a96086772035abe54012b5f4ea72
-Size (vault-1.6.1.tar.gz) = 39080880 bytes
+SHA1 (vault-1.6.2.tar.gz) = eb57f9724b8c6c46012052d34932aa6c3ba1a1ad
+RMD160 (vault-1.6.2.tar.gz) = 62e20ba17e1155f2536d2eab5eb2b805dec9c1dc
+SHA512 (vault-1.6.2.tar.gz) = 4269778efebbf45bb56d902eb800a8e66dbf4569ae67eb422da33d0df149bb133c86940e29ed4d2d14bc89065ec7814912e04ab9024bfbc2ef125c1f46796c9a
+Size (vault-1.6.2.tar.gz) = 39088821 bytes
 SHA1 (patch-scripts_gen__openapi.sh) = 1ad66480ef135adec05f58b088440e0bec6b4ab8
 SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 86d985a6aac6b0eaaf6bdc3b1e4a7e2d17454a6a
 SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 09c2f699b37fcb2ea05ca0df270359426a0629b7



Home | Main Index | Thread Index | Old Index