|
| 1 | +## 1.17.5 Enterprise (May 14, 2024) |
| 2 | + |
| 3 | +SECURITY: |
| 4 | + |
| 5 | +* Bump Dockerfile base image to `alpine:3.19`. [[GH-20897](https://github.com/hashicorp/consul/issues/20897)] |
| 6 | +* Update `vault/api` to v1.12.2 to address [CVE-2024-28180](https://nvd.nist.gov/vuln/detail/CVE-2024-28180) |
| 7 | + (removes indirect dependency on impacted `go-jose.v2`) [[GH-20910](https://github.com/hashicorp/consul/issues/20910)] |
| 8 | +* Upgrade Go to use 1.21.10. This addresses CVEs |
| 9 | + [CVE-2024-24787](https://nvd.nist.gov/vuln/detail/CVE-2024-24787) and |
| 10 | + [CVE-2024-24788](https://nvd.nist.gov/vuln/detail/CVE-2024-24788) [[GH-21074](https://github.com/hashicorp/consul/issues/21074)] |
| 11 | +* Upgrade to support Envoy `1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3`. This resolves CVEs |
| 12 | + [CVE-2024-27919](https://nvd.nist.gov/vuln/detail/CVE-2024-27919) (`http2`). [[GH-20956](https://github.com/hashicorp/consul/issues/20956)] and [CVE-2024-32475](https://nvd.nist.gov/vuln/detail/CVE-2024-32475) (`auto_sni`). [[GH-21030](https://github.com/hashicorp/consul/issues/21030)] |
| 13 | +* Upgrade to support k8s.io/apimachinery `v0.18.7 or higher`. This resolves CVE |
| 14 | + [CVE-2020-8559](https://nvd.nist.gov/vuln/detail/CVE-2020-8559). [[GH-21033](https://github.com/hashicorp/consul/issues/21033)] |
| 15 | +* Upgrade to use Go `1.21.9`. This resolves CVE |
| 16 | + [CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288) (`http2`). [[GH-20956](https://github.com/hashicorp/consul/issues/20956)] |
| 17 | +* Upgrade to use golang.org/x/net `v0.24.0`. This resolves CVE |
| 18 | + [CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288) (`x/net`). [[GH-20956](https://github.com/hashicorp/consul/issues/20956)] |
| 19 | +* security: Remove `coredns/coredns` dependency to address [CVE-2024-0874](https://nvd.nist.gov/vuln/detail/CVE-2024-0874) [[GH-9243](https://github.com/hashicorp/consul/issues/9243)] |
| 20 | + |
| 21 | +BUG FIXES: |
| 22 | + |
| 23 | +* dns: fix a bug with sameness group queries in DNS where responses did not respect [`DefaultForFailover`](/consul/docs/connect/config-entries/sameness-group#defaultforfailover). |
| 24 | + DNS requests against sameness groups without this field set will now error as intended. |
| 25 | +* xds: Make TCP external service registered with terminating gateway reachable from peered cluster [[GH-19881](https://github.com/hashicorp/consul/issues/19881)] |
| 26 | + |
1 | 27 | ## 1.17.4 Enterprise (March 26, 2024)
|
2 | 28 |
|
3 | 29 | SECURITY:
|
|
0 commit comments