Skip to content

Commit a4d77da

Browse files
authored
Release v0.62.1 (#6618)
Signed-off-by: Stephan Renatus <[email protected]>
1 parent 79d2f53 commit a4d77da

File tree

5 files changed

+4959
-10
lines changed

5 files changed

+4959
-10
lines changed

CHANGELOG.md

+25-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,31 @@
33
All notable changes to this project will be documented in this file. This
44
project adheres to [Semantic Versioning](http://semver.org/).
55

6-
## Unreleased
6+
## 0.62.1
7+
8+
This is a security fix release for the fixes published in [Golang 1.22.1](https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg).
9+
10+
OPA servers using `--authentication=tls` would be affected: crafted malicious client
11+
certificates could cause a panic in the server.
12+
13+
Also, crafted server certificates could panic OPA's HTTP clients, in bundle plugin,
14+
status and decision logs; and `http.send` calls that verify TLS.
15+
16+
This affects all crypto/tls clients, and servers that set Config.ClientAuth to
17+
VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is
18+
for TLS servers to not verify client certificates.
19+
20+
This is CVE-2024-24783 (https://pkg.go.dev/vuln/GO-2024-2598).
21+
22+
Note that there are other security fixes in this Golang release, but whether or not
23+
OPA is affected is harder to tell. An update is advised.
24+
25+
26+
### Miscellaneous
27+
28+
- Add Trino to OPA ecosystem (authored by @mosabua)
29+
- update: ADOPTERS.md (#6608) (authored by @fredmaggiowski)
30+
731

832
## 0.62.0
933

0 commit comments

Comments
 (0)