Skip to content

Commit e99e1a7

Browse files
(DOCSP-24131): v1.5.4 release notes (#228)
* (DOSP-24131): v1.5.4 release notes * wording * Update source/changelog.txt Co-authored-by: Anna Henningsen <[email protected]> * review fixes Co-authored-by: Anna Henningsen <[email protected]>
1 parent 5b4cec8 commit e99e1a7

File tree

2 files changed

+23
-1
lines changed

2 files changed

+23
-1
lines changed

snooty.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ toc_landing_pages = ["/run-commands",
1414

1515
[constants]
1616

17-
version = "1.5.3"
17+
version = "1.5.4"
1818
mdb-version = "6.0"
1919
pgp-version = "{+mdb-version+}"
2020

source/changelog.txt

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,28 @@ Release Notes
1212
:depth: 1
1313
:class: singlecol
1414

15+
v1.5.4
16+
------
17+
18+
*Released July 31, 2022*
19+
20+
Fixes a potential data corruption bug in
21+
:method:`KeyVault.rewrapManyDataKey()` when rotating encrypted data
22+
encryption keys backed by Azure or GCP key services.
23+
24+
In previous versions of ``mongosh``, this bug occurs when an
25+
Azure-backed or GCP-backed data encryption key being rewrapped requires
26+
fetching an access token for decryption of the data encryption key.
27+
28+
As a result of this bug, all data encryption keys being rewrapped are
29+
replaced by new randomly generated material, destroying the original key
30+
material.
31+
32+
To mitigate potential data corruption, upgrade ``mongosh`` to v1.5.4 or
33+
higher before using :method:`KeyVault.rewrapManyDataKey()` to rotate
34+
Azure-backed or GCP-backed data encryption keys. You should always
35+
create a backup of the key vault collection before key rotation.
36+
1537
v1.5.3
1638
------
1739

0 commit comments

Comments
 (0)