You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a patch release that fixes a potential data corruption bug in `RewrapManyDataKey` when rotating encrypted data encryption keys backed by GCP or Azure key services.
4
+
5
+
The following conditions will trigger this bug:
6
+
7
+
- A GCP-backed or Azure-backed data encryption key being rewrapped requires fetching an access token for decryption of the data encryption key.
8
+
9
+
The result of this bug is that the key material for all data encryption keys being rewrapped is replaced by new randomly generated material, destroying the original key material.
10
+
11
+
To mitigate potential data corruption, upgrade to this version or higher before using `RewrapManyDataKey` to rotate Azure-backed or GCP-backed data encryption keys. A backup of the key vault collection should **always** be taken before key rotation.
12
+
13
+
An online version of these release notes is available at:
0 commit comments