chore(deps): update module github.com/hashicorp/consul to v1.20.1 [security] (release-3.2.x) #15893
+3,593
−1,176
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.14.5
->v1.20.1
Hashicorp Consul Cross-site Scripting vulnerability
BIT-consul-2024-10086 / CVE-2024-10086 / GHSA-99wr-c2px-grmh / GO-2024-3242
More information
Details
A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
BIT-consul-2024-10086 / CVE-2024-10086 / GHSA-99wr-c2px-grmh / GO-2024-3242
More information
Details
Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul
BIT-consul-2024-10006 / CVE-2024-10006 / GHSA-5c4w-8hhh-3c3h / GO-2024-3241
More information
Details
Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability
BIT-consul-2024-10006 / CVE-2024-10006 / GHSA-5c4w-8hhh-3c3h / GO-2024-3241
More information
Details
A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul
BIT-consul-2024-10005 / CVE-2024-10005 / GHSA-chgm-7r52-whjj / GO-2024-3243
More information
Details
Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Hashicorp Consul Path Traversal vulnerability
BIT-consul-2024-10005 / CVE-2024-10005 / GHSA-chgm-7r52-whjj / GO-2024-3243
More information
Details
A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
hashicorp/consul (github.com/hashicorp/consul)
v1.20.1
Compare Source
1.20.1 (October 29, 2024)
BREAKING CHANGES:
HttpConnectionManager.normalize_path
by default on inbound traffic to mesh proxies. This resolves CVE-2024-10005. [GH-21816]SECURITY:
contains
andignoreCase
to L7 Intentions HTTP header matching criteria to support configuration resilient to variable casing and multiple values. This resolves CVE-2024-10006. [GH-21816]http.incoming.requestNormalization
to Mesh configuration entry to support inbound service traffic request normalization. This resolves CVE-2024-10005 and CVE-2024-10006. [GH-21816]IMPROVEMENTS:
v1.20.0
Compare Source
1.20.0 (October 14, 2024)
SECURITY:
CVE-2024-34155 [GH-21705]
v1.55.5 or higher
. This resolves CVEsCVE-2020-8911 and
CVE-2020-8912. [GH-21684]
FEATURES:
IMPROVEMENTS:
BUG FIXES:
v1.19.2
Compare Source
1.19.2 (August 26, 2024)
SECURITY:
IMPROVEMENTS:
BUG FIXES:
v1.19.1
Compare Source
1.19.1 (July 11, 2024)
SECURITY:
IMPROVEMENTS:
BUG FIXES:
This affected Nomad integrations with Consul. [GH-21361]
tag.name.service.consul
, were being disregarded. [GH-21361]that was always being logged on each prepared query evaluation. [GH-21381]
v1.19.0
Compare Source
1.19.0 (June 12, 2024)
BREAKING CHANGES:
consul
element in the metric name have been removed. Please use the same metric without the secondconsul
instead. As an example instead ofconsul.consul.state.config_entries
useconsul.state.config_entries
[GH-20674]SECURITY:
1.27.5 and 1.28.3
. This resolves CVECVE-2024-32475 (
auto_sni
). [GH-21017]v0.18.7 or higher
. This resolves CVECVE-2020-8559. [GH-21017]
FEATURES:
Use
v1dns
in theexperiments
agent config to disable.The legacy server will be removed in a future release of Consul.
See the Consul 1.19.x Release Notes for removed DNS features. [GH-20715]
IMPROVEMENTS:
github.com/envoyproxy/go-control-plane
to 0.12.0. [GH-20973]consul-dataplane
now accepts partition, namespace, token as metadata to default those query parameters.consul-dataplane
v1.5+ will send this information automatically. [GH-20899]consul snapshot decode
CLI command to output a JSON object stream of all the snapshots data. [GH-20824]telemetry.disable_per_tenancy_usage_metrics
in agent configuration to disable setting tenancy labels on usage metrics. This significantly decreases CPU utilization in clusters with many admin partitions or namespaces.DEPRECATIONS:
local_storage
,aws_storage
,azure_blob_storage
, andgoogle_storage
in snapshot agent configuration files are now deprecated. Use thebackup_destinations
config object instead.BUG FIXES:
v1.18.2
Compare Source
1.18.2 (May 14, 2024)
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
SECURITY:
alpine:3.19
. [GH-20897]vault/api
to v1.12.2 to address CVE-2024-28180(removes indirect dependency on impacted
go-jose.v2
) [GH-20910]CVE-2024-24787 and
CVE-2024-24788 [GH-21074]
1.26.8, 1.27.4, 1.27.5, 1.28.2 and 1.28.3
. This resolves CVEsCVE-2024-27919 (
http2
). [GH-20956] and CVE-2024-32475 (auto_sni
). [GH-21030]v0.18.7 or higher
. This resolves CVECVE-2020-8559. [GH-21034]
1.21.9
. This resolves CVECVE-2023-45288 (
http2
). [GH-20956]v0.24.0
. This resolves CVECVE-2023-45288 (
x/net
). [GH-20956]IMPROVEMENTS:
BUG FIXES:
DefaultForFailover
.DNS requests against sameness groups without this field set will now error as intended.
v1.18.1
Compare Source
1.18.1 (March 26, 2024)
Enterprise LTS: Consul Enterprise 1.18 is a Long-Term Support (LTS) release.
BREAKING CHANGES:
SECURITY:
google.golang.org/protobuf
to v1.33.0 to address CVE-2024-24786. [GH-20801]alpine3.19
. This resolves CVEsCVE-2023-52425
CVE-2023-52426 [GH-20812]
1.21.8
. This resolves CVEsCVE-2024-24783 (
crypto/x509
).CVE-2023-45290 (
net/http
).CVE-2023-45289 (
net/http
,net/http/cookiejar
).CVE-2024-24785 (
html/template
).CVE-2024-24784 (
net/mail
). [GH-20812]IMPROVEMENTS:
backup_destinations
config file object.BUG FIXES:
v1.18.0
Compare Source
BREAKING CHANGES:
telemetry.disable_hostname
when determining whether to prefix gauge-type metrics with the hostname of the Consul agent. Previously, if only the default metric sink was enabled, this configuration was ignored and always treated astrue
, even though its default value isfalse
. [GH-20312]SECURITY:
golang.org/x/crypto
to v0.17.0 to address CVE-2023-48795. [GH-20023]FEATURES:
Use
v2dns
in theexperiments
agent config to enable.It will automatically be enabled when using the
resource-apis
(Catalog v2) experiment.The new DNS implementation will be the default in Consul 1.19.
See the Consul 1.18.x Release Notes for deprecated DNS features. [GH-20643]
IMPROVEMENTS:
envoy.config.core.v3.HeaderValueOption.append
. [GH-20078]envoy.config.route.v3.HeaderMatcher.safe_regex_match
andenvoy.type.matcher.v3.RegexMatcher.google_re2
. [GH-20013]BUG FIXES:
v1.17.4
Compare Source
v1.17.3
Compare Source
1.17.3 (February 13, 2024)
SECURITY:
FEATURES:
exported-services
to list all services exported and their consumers. Refer to the CLI docs for more information. [GH-20331]IMPROVEMENTS:
Internal.ServiceDump
when mesh gateway is not used. [GH-20168]Internal.ServiceDump
watch from proxycfg [GH-20168]CaseInsensitive
flag to service-routers that allows paths and path prefixes to ignore URL upper and lower casing. [GH-19647]BUG FIXES:
http
protocol fails with a protocol-mismatch error. [GH-20481]v1.17.2
Compare Source
1.17.2 (January 23, 2024)
KNOWN ISSUES:
SECURITY:
ubi9-minimal:9.3
as the base image. [GH-20014]IMPROVEMENTS:
match_subject_alt_names
in favor ofmatch_typed_subject_alt_names
. [GH-19954]envoy.config.router.v3.WeightedCluster.total_weight
. [GH-20011]envoy.config.cluster.v3.Cluster.http_protocol_options
[GH-20010]envoy.config.cluster.v3.Cluster.http2_protocol_options
,envoy.config.bootstrap.v3.Admin.access_log_path
[GH-19940]envoy.extensions.filters.http.lua.v3.Lua.inline_code
[GH-20012]DEPRECATIONS:
-admin-access-log-path
flag fromconsul connect envoy
command in favor of:-admin-access-log-config
. [GH-19943]BUG FIXES:
v1.17.1
Compare Source
1.17.1 (December 12, 2023)
SECURITY:
github.com/golang-jwt/jwt/v4
to v4.5.0 to address PRISMA-2022-0270. [GH-19705]CVE-2023-45283: (
path/filepath
) recognize ??\ as a Root Local Device path prefix (Windows)CVE-2023-45284: recognize device names with trailing spaces and superscripts (Windows)
CVE-2023-39326: (
net/http
) limit chunked data overheadCVE-2023-45285: (
cmd/go
) go get may unexpectedly fallback to insecure git [GH-19840]FEATURES:
peering exported-services
to list services exported to a peer . Refer to the CLI docs for more information. [GH-19821]IMPROVEMENTS:
stats_flush_interval
to 60 seconds when using the Consul Telemetry Collector, unless custom stats sink are present or an explicit flush interval is configured. [GH-19663]BUG FIXES:
xds_fetch_timeout_ms
option to proxy registrations that allows users to prevent endpoints from dropping when they have proxies with a large number of upstreams. [GH-19871]v1.17.0
Compare Source
1.17.0 (October 31, 2023)
BREAKING CHANGES:
DEPRECATIONS:
-admin-access-log-path
flag fromconsul connect envoy
command in favor of:-admin-access-log-config
. [GH-15946]SECURITY:
golang.org/x/net
to v0.17.0 to address CVE-2023-39325/ CVE-2023-44487(
x/net/http2
). [GH-19225]This resolves vulnerability CVE-2023-39325
/ CVE-2023-44487(
net/http
). [GH-19225]google.golang.org/grpc
to 1.56.3.This resolves vulnerability CVE-2023-44487. [GH-19414]
FEATURE PREVIEW: Catalog v2
This release provides the ability to preview Consul's v2 Catalog and Resource API if enabled. The new model supports
multi-port application deployments with only a single Envoy proxy. Note that the v1 and v2 catalogs are not cross
compatible, and not all Consul features are available within this v2 feature preview. See the v2 Catalog and Resource
API documentation for more information. The v2 Catalog and
Resources API should be considered a feature preview within this release and should not be used in production
environments.
Limitations
Significant Pull Requests
FEATURES:
acl.tokens.dns
config field which specifies the token used implicitly during dns checks. [GH-17936]bind-var
flag toconsul acl binding-rule
for templated policy variables. [GH-18719]consul acl templated-policy
commands to read, list and preview templated policies. [GH-18816]IMPROVEMENTS:
CheckRegisterOpts
to Agent API [GH-18943]Token
field toServiceRegisterOpts
type in Agent API [GH-18983]-templated-policy
,-templated-policy-file
,-replace-templated-policy
,-append-templated-policy
,-replace-templated-policy-file
,-append-templated-policy-file
and-var
flags for creating or updating tokens/roles. [GH-18708]tls.defaults.verify_server_hostname
configuration option. This specifies the default value for any interfaces that support theverify_server_hostname
option. [GH-17155]BUG FIXES:
/v1/catalog/services
endpoint [GH-18322]performance.grpc_keepalive_timeout
andperformance.grpc_keepalive_interval
now exist to allow for configuration on how often these dead connections will be cleaned up. [GH-19339]v1.16.7
Compare Source
v1.16.6
Compare Source
1.16.6 (February 13, 2024)
SECURITY:
IMPROVEMENTS:
Internal.ServiceDump
when mesh gateway is not used. [GH-20168]Internal.ServiceDump
watch from proxycfg [GH-20168]BUG FIXES:
http
protocol fails with a protocol-mismatch error. [GH-20481]Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.