![]() ![]() ![]() tsh subcommands now support -query and -labels optional arguments.tctl sso configure github now includes default GitHub endpoints #31480.Fixed database and k8s cluster resource names to avoid name collisions.Fixed desktop sessions' viewport size to the size of browser window at session start.Fixed terminal resizing bug in web terminal.Fixed a MissingRegion error that would sometimes occur when running the discovery bootstrap command #31701.Fixed directory sharing in Desktop Access for non-ascii directory names.Fails with an error if desktops are created with invalid names.Support discovery for new AWS region il-central-1.Extend EC2 joining to Discovery, MDM and Okta services.Added support for bot and agent joining from external Kubernetes Clusters.Added pprof support to Kubernetes Operator to diagnose memory use.Added single-command AWS OIDC integration.Added change_feed_conn_string option to PostgreSQL backend.Using Teleport SAML IdP functionality aren’t affected by this vulnerability. This issue only affects Teleport Enterprise Edition. This could allow an attacker to execute arbitrary code at the client-side When registering a service provider with SAML IdP, Teleport did not sufficiently Users who aren’t using tsh on Windows aren’t affected by this vulnerability. This could allow a malicious user to create harmful command aliases for all tsh Would look for the file in a potentially untrusted directory. When loading the global tsh configuration file tsh.yaml on Windows, Teleport #32215 Privilege escalation via untrusted config file on Windows Users who aren’t using self-hosted database access aren’t affected by this ![]() This could allow an attacker to sign valid database access certificates using a When signing self-hosted database certificates, Teleport did not sufficiently #32210 Insufficient auth token verification when signing self-hosted database certificates Users who aren't using automatic Linux host user creation aren’t affected by This could allow the attacker to escalate their privileges to root. System as root writable by the created user. When using automatic Linux user creation, an attacker could exploit a raceĬondition in the user creation functionality to create arbitrary files on the Changelog 13.4.0 (09/20/23) Security Fixes Privilege escalation via host user creation ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |