Skip to content

Commit a08f8ba

Browse files
committed
auto-merge envoyproxy/envoy[release/v1.34] into envoyproxy/envoy-openssl[release/v1.34]
* upstream/release/v1.34: repo: Release v1.34.11 changelogs/1.34.11: Add summary Add option to reject early CONNECT data fix jwt_auth crash with two or more auth header tls: fix SAN validation for OTHERNAME types with embedded nulls Certificates with an OTHERNAME SAN using type `V_ASN1_UNIVERSALSTRING` or `V_ASN1_BMPSTRING` with an embedded null would have the name truncated at the first null, resulting in an incorrect check. tcp_proxy: fixes a cx leak in the TCP Proxy when receive_before_connect is enabled (#42024) distribution/docker: Bump Ubuntu -> 104ae837 (#42337) distribution/docker: Install tzdata (#42338) bazel: Bump -> 7.7.1 (#42295) bazelrc: Add compatibility with repo settings github/ci: Fix request workflow (#42355) Signed-off-by: jwendell <125759+jwendell@users.noreply.github.com>
2 parents 7d41aba + 35e736f commit a08f8ba

File tree

27 files changed

+326
-32
lines changed

27 files changed

+326
-32
lines changed

.bazelrc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -611,6 +611,12 @@ common:debug --config=debug-sandbox
611611
common:debug --config=debug-coverage
612612
common:debug --config=debug-tests
613613

614+
#############################################################################
615+
# compat: Compatibility with main branch repo settings
616+
#############################################################################
617+
common:bes --config=bes-envoy-engflow
618+
common:rbe --config=remote-envoy-engflow
619+
614620
try-import %workspace%/repo.bazelrc
615621
try-import %workspace%/clang.bazelrc
616622
try-import %workspace%/user.bazelrc

.bazelversion

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
7.6.2
1+
7.7.1

.github/workflows/request.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ concurrency:
2525
jobs:
2626
request:
2727
permissions:
28-
actions: read
28+
actions: write
2929
contents: read
3030
packages: read
3131
# required to fetch merge commit
@@ -36,9 +36,6 @@ jobs:
3636
app-id: ${{ secrets.ENVOY_CI_APP_ID }}
3737
lock-app-key: ${{ secrets.ENVOY_CI_MUTEX_APP_KEY }}
3838
lock-app-id: ${{ secrets.ENVOY_CI_MUTEX_APP_ID }}
39-
gcs-cache-key: ${{ secrets.GCS_CACHE_WRITE_KEY }}
40-
with:
41-
gcs-cache-bucket: ${{ vars.ENVOY_CACHE_BUCKET }}
4239
# For branches this can be pinned to a specific version if required
4340
# NB: `uses` cannot be dynamic so it _must_ be hardcoded anywhere it is read
4441
uses: envoyproxy/envoy/.github/workflows/_request.yml@main

VERSION.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.34.11-dev
1+
1.34.11

changelogs/1.33.13.yaml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
date: December 3, 2025
2+
3+
behavior_changes:
4+
- area: http
5+
change: |
6+
Added runtime flag ``envoy.reloadable_features.reject_early_connect_data`` to reject ``CONNECT`` requests
7+
that receive data before Envoy sent a ``200`` response to the client. While this is not a strictly compliant behavior
8+
it is very common as a latency reducing measure. As such the option is disabled by default.
9+
10+
bug_fixes:
11+
- area: tls
12+
change: |
13+
Fixed an issue where SANs of type ``OTHERNAME`` in a TLS cert were truncated if there was
14+
an embedded null octet, leading to incorrect SAN validation.
15+
- area: http
16+
change: |
17+
Fixed a remote ``jwt_auth`` token fetch crash with two or more auth headers when ``allow_missing_or_failed`` is set.

changelogs/current.yaml

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,28 @@
1-
date: Pending
1+
date: December 3, 2025
22

33
behavior_changes:
4-
# *Changes that are expected to cause an incompatibility if applicable; deployment changes are likely required*
54
- area: dynamic modules
65
change: |
76
The dynamic module ABI has been updated to support streaming body manipulation. This change also
87
fixed potential incorrect behavior when access or modify the request or response body. See
98
https://github.com/envoyproxy/envoy/issues/40918 for more details.
10-
11-
minor_behavior_changes:
12-
# *Changes that may cause incompatibilities for some users, but should not for most*
9+
- area: http
10+
change: |
11+
Added runtime flag ``envoy.reloadable_features.reject_early_connect_data`` to reject ``CONNECT`` requests
12+
that receive data before Envoy sent a ``200`` response to the client. While this is not a strictly compliant behavior
13+
it is very common as a latency reducing measure. As such the option is disabled by default.
1314
1415
bug_fixes:
15-
# *Changes expected to improve the state of the world and are unlikely to have negative effects*
16-
17-
removed_config_or_runtime:
18-
# *Normally occurs at the end of the* :ref:`deprecation period <deprecated>`
19-
20-
new_features:
16+
- area: tcp_proxy
17+
change: |
18+
Fixed a connection leak in the TCP proxy when the ``receive_before_connect`` feature is enabled and the
19+
downstream connection closes before the upstream connection is established.
2120
2221
deprecated:
22+
- area: tls
23+
change: |
24+
Fixed an issue where SANs of type ``OTHERNAME`` in a TLS cert were truncated if there was
25+
an embedded null octet, leading to incorrect SAN validation.
26+
- area: http
27+
change: |
28+
Fixed a remote ``jwt_auth`` token fetch crash with two or more auth headers when ``allow_missing_or_failed`` is set.

changelogs/summary.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
2+
* Security fixes:
3+
- CVE-2025-64527: Envoy crashes when JWT authentication is configured with the remote JWKS fetching
4+
- CVE-2025-66220: TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte
5+
- CVE-2025-64763: Potential request smuggling from early data after the CONNECT upgrade

distribution/docker/Dockerfile-envoy

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
ARG BUILD_OS=ubuntu
22
ARG BUILD_TAG=22.04
3-
ARG BUILD_SHA=09506232a8004baa32c47d68f1e5c307d648fdd59f5e7eaa42aaf87914100db3
3+
ARG BUILD_SHA=104ae83764a5119017b8e8d6218fa0832b09df65aae7d5a6de29a85d813da2fb
44
ARG ENVOY_VRP_BASE_IMAGE=envoy-base
55

66

@@ -29,7 +29,7 @@ RUN --mount=type=tmpfs,target=/var/cache/apt \
2929
--mount=type=tmpfs,target=/var/lib/apt/lists \
3030
apt-get -qq update \
3131
&& apt-get -qq upgrade -y \
32-
&& apt-get -qq install --no-install-recommends -y ca-certificates \
32+
&& apt-get -qq install --no-install-recommends -y ca-certificates tzdata \
3333
&& apt-get -qq autoremove -y
3434

3535

docs/inventories/v1.33/objects.inv

22 Bytes
Binary file not shown.

docs/inventories/v1.34/objects.inv

39 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)