File tree Expand file tree Collapse file tree 2 files changed +23
-1
lines changed Expand file tree Collapse file tree 2 files changed +23
-1
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ toc_landing_pages = ["/run-commands",
14
14
15
15
[constants ]
16
16
17
- version = " 1.5.3 "
17
+ version = " 1.5.4 "
18
18
mdb-version = " 6.0"
19
19
pgp-version = " {+mdb-version+}"
20
20
Original file line number Diff line number Diff line change @@ -12,6 +12,28 @@ Release Notes
12
12
:depth: 1
13
13
:class: singlecol
14
14
15
+ v1.5.4
16
+ ------
17
+
18
+ *Released July 31, 2022*
19
+
20
+ Fixes a potential data corruption bug in
21
+ :method:`KeyVault.rewrapManyDataKey()` when rotating encrypted data
22
+ encryption keys backed by Azure or GCP key services.
23
+
24
+ In previous versions of ``mongosh``, this bug occurs when an
25
+ Azure-backed or GCP-backed data encryption key being rewrapped requires
26
+ fetching an access token for decryption of the data encryption key.
27
+
28
+ As a result of this bug, all data encryption keys being rewrapped are
29
+ replaced by new randomly generated material, destroying the original key
30
+ material.
31
+
32
+ To mitigate potential data corruption, upgrade ``mongosh`` to v1.5.4 or
33
+ higher before using :method:`KeyVault.rewrapManyDataKey()` to rotate
34
+ Azure-backed or GCP-backed data encryption keys. You should always
35
+ create a backup of the key vault collection before key rotation.
36
+
15
37
v1.5.3
16
38
------
17
39
You can’t perform that action at this time.
0 commit comments