Releases: spiffe/spire
Releases · spiffe/spire
v1.14.5
Immutable
release. Only release title and notes can be modified.
Security
- Upgrade Go to 1.26.2 to address CVE-2026-32282, CVE-2026-32289, CVE-2026-33810, CVE-2026-27144, CVE-2026-27143, CVE-2026-32288, CVE-2026-32283, CVE-2026-27140, CVE-2026-32281
v1.13.5
Immutable
release. Only release title and notes can be modified.
Security
- Upgrade Go to 1.25.9 to address CVE-2026-32282, CVE-2026-32289, CVE-2026-27144, CVE-2026-27143, CVE-2026-32288, CVE-2026-32283, CVE-2026-27140, CVE-2026-32281
v1.14.4
Immutable
release. Only release title and notes can be modified.
Fixed - The version that the agent was reporting at startup would get replaced by an empty string every time the agent re-attests or re-news it's SVID (#6763)
v1.14.3
Immutable
release. Only release title and notes can be modified.
Added
spire-agentversion is now reported tospire-servervia the PostStatus API and visible inGetAgent/ListAgentsCLI output (#6542)
Changed
- The
RequirePQKEMTLS policy now uses the standardizedX25519MLKEM768instead of the draftx25519Kyber768Draft00(#6703) - OPA policy evaluation performance improved by ~2x, based on benchmarking, through use of partial evaluation (#6633)
Fixed
ReadOnlyEntry.Clone()was incorrectly copying theAdminboolean into theDownstreamfield when applying an output mask, causing clients ofGetAuthorizedEntriesandSyncAuthorizedEntriesto receive corrupted authorization metadata. TheAdminandDownstreambooleana were not used inspire-agentso there was no impact from this (#6636)- The periodic node cache rebuild was only executing once instead of running continuously at the configured interval (#6661)
- Race condition in the
spireupstream authority plugin during shutdown that could cause a nil pointer dereference on the bundle client (#6590) aws_iidattestor AWS request timeout increased from 5s to 20s to prevent intermittent attestation failures in large AWS Organizations (#6558)- Federated trust bundles are now fetched concurrently, reducing the chance of exceeding the agent sync timeout when there are many federation relationships (#6491)
- JWT-SVID refresh now uses a 1s timeout when a cached SVID already exists, preventing an unresponsive server from blocking delivery of a valid cached SVID (#6454)
- Documentation improvements (#6607, #6608, #6632)
Security
- Selectors are no longer logged at the agent level to avoid potential leakage of sensitive information (#6732)
- Fixed an issue where TLS session ticket resumption on the server TCP endpoint could bypass SPIFFE certificate chain validation against the current trust bundle. TLS session tickets are now disabled on the server side, ensuring
VerifyPeerCertificateruns on every connection (#6715)
v1.14.2
Immutable
release. Only release title and notes can be modified.
Security
- Fixed an issue in the
http_challengeserver node attestor plugin which allowed an attacker to make an SSRF attack. The attacker could potentially redirect the server to a domain that they wouldn't normally have access to. spire-server would make an unauthenticated GET request to that domain and return the first 64 bytes of the response to the attacker. Thank you, Oleh Konko (@1seal) for reporting this isuse. - Fixed an issue in the
x509popserver node attestor plugin which allowed an attacker to make spire-server consume large and disproportionate amounts of CPU time for the node attestation process. Thank you Jakub Ciolek for reporting this issue.
v1.13.4
Immutable
release. Only release title and notes can be modified.
Security
- Fixed an issue in the
http_challengeserver node attestor plugin which allowed an attacker to make an SSRF attack. The attacker could potentially redirect the server to a domain that they wouldn't normally have access to. spire-server would make an unauthenticated GET request to that domain and return the first 64 bytes of the response to the attacker. Thank you, Oleh Konko (@1seal) for reporting this isuse. - Fixed an issue in the
x509popserver node attestor plugin which allowed an attacker to make spire-server consume large and disproportionate amounts of CPU time for the node attestation process. Thank you Jakub Ciolek for reporting this issue.
v1.14.1
v1.14.0
Immutable
release. Only release title and notes can be modified.
Added
- New
azure_imdsnode attestor plugin for attesting nodes running in Microsoft Azure using the Azure Instance Metadata Service (IMDS) (#6312) - The AWS KMS key manager plugin now supports key tagging (#6410)
- The JWT-SVID profile on spire server can now be disabled using the
disable_jwt_svidsconfig (#6272) spire-server validatenow supports validating plugin configuration (#6355)- Support for ec-p384 curve in the
workload_x509_svid_key_typeconfiguration option in spire-agent (#6389) - The docker workload attestor now supports the
docker:image_config_digestselector (#6391) - GCP CAs now specify a
certificate_idinCreateCertificateRequestfor Enterprise tier compatibility (#6392) - Dummy implementations for the WIT-SVID profile (#6399)
- GCP cloudsql-proxy can now be used with postgres (#6463)
- The KeyManager directory is now validated to exist and be writeable on agent startup (#6397)
Changed
- QueryContext is now used for querying the version database version and CTE support (#6461)
- The
k8sanddockerworkload attestors now ignore cgroup mountinfo with root == / (#6462) - spire-server now stops fetching all events if a context cancelled error is returned while processing a list of events (#6472)
Removed
- Removed the deprecated 'retry_rebootstrap' agent config (#6431)
- Removed unused database model, V3AttestedNode (#6381)
Fixed
v1.13.3
Added
- X.509 CA metric with absolute expiration time in addition to TTL-based metric (#6303)
spire-agentconfiguration to source join tokens from files to support integration with third-party credential providers (#6330)- Capability to filter on caller path in
spire-serverRego authorization policies (#6320)
Changed
spire-serverwill use the SHA-256 algorithm for X.509-SVID Subject Key Identifiers when theGODEBUGenvironment variable containsfips140=only(#6294)- Attested node entries are now purged at a fixed interval with jitter (#6315)
oidc-discovery-providernow fails to initialize when started with unrecognized arguments (#6297)
Fixed
v1.13.2
Security
- Upgrade Go to 1.25.2 to address CVE-2025-58187, CVE-2025-61723, CVE-2025-47912, CVE-2025-58185, and CVE-2025-58188 (#6363)