Skip to content

Commit 0004c1d

Browse files
authored
v0.28.1 (#1236)
* mostly security fixes Signed-off-by: Volkan Özçelik <me@volkan.io> * mostly security fixes Signed-off-by: Volkan Özçelik <me@volkan.io> --------- Signed-off-by: Volkan Özçelik <me@volkan.io>
1 parent 3ad713b commit 0004c1d

File tree

2 files changed

+20
-0
lines changed

2 files changed

+20
-0
lines changed

.github/workflows/test-coverage.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,9 @@ on:
33
push:
44
branches:
55
- main
6+
7+
permissions: read-all # Set default permissions to read-only for the workflow
8+
69
jobs:
710
build:
811
runs-on: ubuntu-latest

docs/content/timeline/changelog.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,26 @@ weight = 11
1515

1616
## Recent Changes
1717

18+
TBD
19+
20+
## [0.28.1] - 2025-01-25
21+
22+
This is a security patch to recent CVE scan results.
23+
24+
### Changed
25+
1826
* Removed the `--append` flag from VSecM Sentinel CLI.
1927
* Minor bugfixes.
2028

29+
### Security
30+
31+
* Fixed CVE-2024-45337 [Misuse of ServerConfig.PublicKeyCallback may cause
32+
authorization bypass in golang.org/x/crypto](https://github.com/vmware-tanzu/secrets-manager/security/dependabot/34)
33+
* Fixed CVE-2024-45338 [Non-linear parsing of case-insensitive content
34+
in golang.org/x/net/html](https://github.com/vmware-tanzu/secrets-manager/security/dependabot/38)
35+
* Fixed GHSA-32gq-x56h-299c [age vulnerable to malicious plugin names,
36+
recipients, or identities causing arbitrary binary execution](https://github.com/vmware-tanzu/secrets-manager/security/dependabot/35)
37+
2138
## [0.28.0] - 2024-10-05
2239

2340
### Added

0 commit comments

Comments
 (0)