File tree Expand file tree Collapse file tree 2 files changed +23
-1
lines changed Expand file tree Collapse file tree 2 files changed +23
-1
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ toc_landing_pages = ["/run-commands",
1414
1515[constants ]
1616
17- version = " 1.5.3 "
17+ version = " 1.5.4 "
1818mdb-version = " 6.0"
1919pgp-version = " {+mdb-version+}"
2020
Original file line number Diff line number Diff line change @@ -12,6 +12,28 @@ Release Notes
1212 :depth: 1
1313 :class: singlecol
1414
15+ v1.5.4
16+ ------
17+
18+ *Released July 31, 2022*
19+
20+ Fixes a potential data corruption bug in
21+ :method:`KeyVault.rewrapManyDataKey()` when rotating encrypted data
22+ encryption keys backed by Azure or GCP key services.
23+
24+ In previous versions of ``mongosh``, this bug occurs when an
25+ Azure-backed or GCP-backed data encryption key being rewrapped requires
26+ fetching an access token for decryption of the data encryption key.
27+
28+ As a result of this bug, all data encryption keys being rewrapped are
29+ replaced by new randomly generated material, destroying the original key
30+ material.
31+
32+ To mitigate potential data corruption, upgrade ``mongosh`` to v1.5.4 or
33+ higher before using :method:`KeyVault.rewrapManyDataKey()` to rotate
34+ Azure-backed or GCP-backed data encryption keys. You should always
35+ create a backup of the key vault collection before key rotation.
36+
1537v1.5.3
1638------
1739
You can’t perform that action at this time.
0 commit comments