Skip to content

Commit 3261d11

Browse files
Prepare 1.21.5 (#22800)
* Security Vulnerability suppression (#22798) * Changes Logs Updated for 1.21.5 (#22799)
1 parent 7397d9c commit 3261d11

File tree

3 files changed

+58
-1
lines changed

3 files changed

+58
-1
lines changed

.release/security-scan.hcl

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,29 @@ container {
3737
triage {
3838
suppress {
3939
vulnerabilities = [
40+
"CVE-2024-40896",
41+
"CVE-2025-5914",
42+
"CVE-2024-57970",
43+
"CVE-2025-31115",
44+
"CVE-2025-6395",
45+
"CVE-2025-8058",
46+
"CVE-2025-8058",
47+
"CVE-2025-8058",
48+
"CVE-2025-6021",
49+
"CVE-2025-32414",
50+
"CVE-2025-3277",
51+
"CVE-2025-5702",
52+
"CVE-2025-5702",
53+
"CVE-2025-5702",
54+
"CVE-2024-4067",
55+
"CVE-2025-47268",
56+
"CVE-2025-25724",
57+
"CVE-2025-6965",
58+
"CVE-2024-23337",
59+
"CVE-2025-3576",
60+
"CVE-2024-12797",
61+
"CVE-2024-12797",
62+
"CVE-2024-52533"
4063
]
4164
paths = [
4265
"internal/tools/proto-gen-rpc-glue/e2e/consul/*",
@@ -77,6 +100,7 @@ binary {
77100
triage {
78101
suppress {
79102
vulnerabilities = [
103+
"GO-2022-0635"
80104
]
81105
paths = [
82106
"internal/tools/proto-gen-rpc-glue/e2e/consul/*",

CHANGELOG.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,36 @@
1+
## 1.21.5 (September 21, 2025)
2+
3+
SECURITY:
4+
5+
* Migrate transitive dependency from archived `mitchellh/mapstructure` to `go-viper/mapstructure` to v2 to address [CVE-2025-52893](https://www.cve.org/CVERecord?id=CVE-2025-52893). [[GH-22581](https://github.com/hashicorp/consul/issues/22581)]
6+
* agent: Add the KV Validations to block path traversal allowing access to unauthorized endpoints. [[GH-22682](https://github.com/hashicorp/consul/issues/22682)]
7+
* agent: Fix a security vulnerability to filter out anonymous tokens along with empty tokens when setting the Results-Filtered-By-ACLs header [[GH-22534](https://github.com/hashicorp/consul/issues/22534)]
8+
* agent: Fix a security vulnerability where the attacker could read agent’s TLS certificate and private key by using the group ID that the Consul agent runs as. [[GH-22626](https://github.com/hashicorp/consul/issues/22626)]
9+
* api: add charset in all applicable content-types. [[GH-22598](https://github.com/hashicorp/consul/issues/22598)]
10+
* connect: Upgrade envoy version to 1.34.7 [[GH-22735](https://github.com/hashicorp/consul/issues/22735)]
11+
* security: Fix GHSA-65rg-554r-9j5x (CVE-2024-48908) by upgrading lycheeverse/lychee-action. [[GH-22667](https://github.com/hashicorp/consul/issues/22667)]
12+
* security: Fix a security vulnerability where the attacker could bypass authentication by passing url params as there was no validation on them. [[GH-22612](https://github.com/hashicorp/consul/issues/22612)]
13+
* security: perform constant time compare for sensitive values. [[GH-22537](https://github.com/hashicorp/consul/issues/22537)]
14+
* security: upgrade go version to 1.25.0 [[GH-22652](https://github.com/hashicorp/consul/issues/22652)]
15+
* security:: **(Enterprise only)** fix nil pointer dereference.
16+
* security:: **(Enterprise only)** fix potential race condition in partition CRUD.
17+
* security:: **(Enterprise only)** perform constant time compare for sensitive values.
18+
19+
FEATURES:
20+
21+
* config: Add new parameter `max_request_headers_kb` to configure maximum header size for requests from downstream to upstream [[GH-22604](https://github.com/hashicorp/consul/issues/22604)]
22+
* config: Handle a new parameter `max_request_headers_kb` to configure maximum header size for requests from downstream to upstream in API Gateway config and proxy-defaults [[GH-22679](https://github.com/hashicorp/consul/issues/22679)]
23+
* config: Handle a new parameter `max_request_headers_kb` to configure maximum header size for requests from downstream to upstream in Mesh Gateway via service-defaults and proxy-defaults [[GH-22722](https://github.com/hashicorp/consul/issues/22722)]
24+
* config: Handle a new parameter `max_request_headers_kb` to configure maximum header size for requests from downstream to upstream in Terminating Gateway service-defaults and proxy-defaults [[GH-22680](https://github.com/hashicorp/consul/issues/22680)]
25+
26+
IMPROVEMENTS:
27+
28+
* cli: add troubleshoot ports in debug command. A ports.json file is created, which lists the open or closed ports on the host where the command is executed. [[GH-22624](https://github.com/hashicorp/consul/issues/22624)]
29+
30+
BUG FIXES:
31+
32+
* agent: Don't show admin partition during errors [[GH-11154](https://github.com/hashicorp/consul/issues/11154)]
33+
134
## 1.21.4 (August 13, 2025)
235

336
SECURITY:

version/VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.21.4-dev
1+
1.21.5

0 commit comments

Comments
 (0)