Skip to content

Conversation

@update-openssl-envoy
Copy link

Generated by envoy-sync-receive.sh

phlax and others added 5 commits December 3, 2025 14:49
selected backport of #42317

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Ryan Northey <ryan@synca.io>
So that `%START_TIME_LOCAL%` works in the logs.

Fixes: #42313

Signed-off-by: Jonh Wendell <jwendell@redhat.com>
Signed-off-by: Jonh Wendell <jwendell@redhat.com>
agrawroh and others added 6 commits December 3, 2025 18:12
…ct is enabled (#42024)

This PR fixes a connection leak in the TCP proxy when the
`receive_before_connect` feature is enabled and the downstream
connection closes before the upstream connection is established.

After this, the TCP Proxy should properly propagates the end-of-stream
signal to the upstream connection even when no data gets received from
the downstream, preventing upstream connection leaks.

Fix envoyproxy/envoy#42006

---

**Commit Message**: tcp_proxy: fixes a cx leak in the TCP Proxy when
receive_before_connect is enabled
**Additional Description:** Fixed a connection leak in the TCP proxy
when the `receive_before_connect` feature is enabled and the downstream
connection closes before the upstream connection is established.
**Risk Level:** Low
**Testing:** Added Tests
**Docs Changes:** N/A
**Release Notes:** Added

Signed-off-by: Rohit Agrawal <rohit.agrawal@databricks.com>
Certificates with an OTHERNAME SAN using type `V_ASN1_UNIVERSALSTRING`
or `V_ASN1_BMPSTRING` with an embedded null would have the name
truncated at the first null, resulting in an incorrect check.

Signed-off-by: Greg Greenway <ggreenway@apple.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Boteng Yao <boteng@google.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Ryan Northey <ryan@synca.io>
* Security fixes:
  - CVE-2025-64527: Envoy crashes when JWT authentication is configured with the remote JWKS fetching
  - CVE-2025-66220: TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte
  - CVE-2025-64763: Potential request smuggling from early data after the CONNECT upgrade

**Docker images**:
    https://hub.docker.com/r/envoyproxy/envoy/tags?page=1&name=v1.34.11
**Docs**:
    https://www.envoyproxy.io/docs/envoy/v1.34.11/
**Release notes**:
    https://www.envoyproxy.io/docs/envoy/v1.34.11/version_history/v1.34/v1.34.11
**Full changelog**:
    envoyproxy/envoy@v1.34.10...v1.34.11
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 3 times, most recently from a08f8ba to 2157058 Compare December 4, 2025 12:11
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 14 times, most recently from 4531b1c to 055de61 Compare December 8, 2025 00:26
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 2 times, most recently from b55e6a8 to 242cd55 Compare December 8, 2025 12:11
…ssl[release/v1.34]

* upstream/release/v1.34:
  repo: Dev v1.34.12
  repo: Release v1.34.11
  changelogs/1.34.11: Add summary
  Add option to reject early CONNECT data
  fix jwt_auth crash with two or more auth header
  tls: fix SAN validation for OTHERNAME types with embedded nulls Certificates with an OTHERNAME SAN using type `V_ASN1_UNIVERSALSTRING` or `V_ASN1_BMPSTRING` with an embedded null would have the name truncated at the first null, resulting in an incorrect check.
  tcp_proxy: fixes a cx leak in the TCP Proxy when receive_before_connect is enabled (#42024)
  distribution/docker: Bump Ubuntu -> 104ae837 (#42337)
  distribution/docker: Install tzdata (#42338)
  bazel: Bump -> 7.7.1 (#42295)
  bazelrc: Add compatibility with repo settings
  github/ci: Fix request workflow (#42355)

Signed-off-by: jwendell <125759+jwendell@users.noreply.github.com>
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch from 242cd55 to a103c6d Compare December 8, 2025 18:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants