Hi,
HAProxy 1.8.25 was released on 2020/04/02. It added 37 new commits
after version 1.8.24.
The main driver for this release is that it contains a fix for a serious
vulnerability that was responsibly reported last week by Felix Wilhelm
from Google Project Zero, affecting the HPACK decoder used for HTTP/2.
CVE-2020-11100 was assigned to this issue.
For version 1.8 it is enough to remove "npn h2" and "alpn h2" on "bind"
lines to disable HTTP/2 support and stay away from the issue. But upgrading
will be way easier and safer!
This vulnerability makes it possible under certain circumstances to write
to a wide range of memory locations within the process' heap, with the
limitation that the attacker doesn't control the absolute address, so the
most likely result and by a far margin will be a process crash, but it is
not possible to completely rule out the faint possibility of a remote code
execution, at least in a lab-controlled environment. Felix was kind enough
to agree to delay the publication of his findings to the 20th of this month
in order to leave enough time to haproxy users to apply updates. But please
do not wait, as it is not very difficult to figure how to exploit the bug
based on the fix. Distros were notified and will also have fixes available
very shortly.
Two other important fixes are present in this version:
- a non-portable way of calculating a list pointer that breaks with
gcc 10 unless using -fno-tree-pta. This bug results in infinite loops
at random places in the code depending how the compiler decides to
optimize the code.
- a bug in the way TLV fields are extracted from the PROXY protocol, as
they could be mistakenly looked up in the subsequent payload, even
though these would have limited effects since these ones would generally
be meaningless for the transported protocol, but could be used to hide a
source address from logging for example.
The rest is less important, but still relevant to some users. Please have a
look at the changelog below for a more detailed list of fixes, and do not
forget to update, either from the sources or from your regular distro channels.
Please find the usual URLs below :
Site index : http://www.haproxy.org/
Discourse : http://discourse.haproxy.org/
Slack channel : https://slack.haproxy.org/
Issue tracker : https://github.com/haproxy/haproxy/issues
Sources : http://www.haproxy.org/download/1.8/src/
Git repository : http://git.haproxy.org/git/haproxy-1.8.git/
Git Web browsing : http://git.haproxy.org/?p=haproxy-1.8.git
Changelog : http://www.haproxy.org/download/1.8/src/CHANGELOG
Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/
Willy
---
Complete changelog :
Bjoern Jacke (1):
DOC: fix typo about no-tls-tickets
Björn Jacke (1):
DOC: improve description of no-tls-tickets
Christopher Faulet (8):
BUG/MINOR: lua: Ignore the reserve to know if a channel is full or not
BUG/MINOR: http-rules: Preserve FLT_END analyzers on reject action
BUG/MINOR: http-rules: Fix a typo in the reject action function
BUG/MINOR: rules: Preserve FLT_END analyzers on silent-drop action
BUG/MINOR: rules: Increment be_counters if backend is assigned for a
silent-drop
MINOR: http-rules: Add a flag on redirect rules to know the rule direction
MINOR: http-rules: Handle the rule direction when a redirect is evaluated
BUG/MINOR: http-ana: Reset request analysers on error when waiting for
response
Daniel Corbett (1):
BUG/MINOR: stats: Fix color of draining servers on stats page
Ilya Shipitsin (1):
DOC: assorted typo fixes in the documentation
Jerome Magnin (1):
BUG/MINOR: http_ana: make sure redirect flags don't have overlapping bits
Lukas Tribus (1):
DOC: ssl: clarify security implications of TLS tickets
Miroslav Zagorac (1):
DOC: internals: Fix spelling errors in filters.txt
Tim Duesterhus (3):
BUG/MINOR: sample: Make sure to return stable IDs in the unique-id fetch
BUG/MAJOR: proxy_protocol: Properly validate TLV lengths
DOC: proxy_protocol: Reserve TLV type 0x05 as PP2_TYPE_UNIQUE_ID
William Dauchy (1):
BUG/MINOR: namespace: avoid closing fd when socket failed in my_socketat
William Lallemand (2):
BUG/MINOR: peers: init bind_proc to 1 if it wasn't initialized
BUG/MINOR: peers: avoid an infinite loop with peers_fe is NULL
Willy Tarreau (16):
SCRIPTS: announce-release: use mutt -H instead of -i to include the draft
CONTRIB: debug: add the possibility to decode the value as certain types
only
CONTRIB: debug: support reporting multiple values at once
CONTRIB: debug: also support reading values from stdin
BUG/MEDIUM: shctx: make sure to keep all blocks aligned
MINOR: compiler: move CPU capabilities definition from config.h and
complete them
BUG/MEDIUM: ebtree: don't set attribute packed without unaligned access
support
BUILD: fix recent build failure on unaligned archs
MINOR: compiler: add new alignment macros
BUILD: ebtree: improve architecture-specific alignment
BUG/MINOR: sample: fix the json converter's endian-sensitivity
BUG/MAJOR: list: fix invalid element address calculation
DOC: fix incorrect indentation of http_auth_*
REGTEST: make the PROXY TLV validation depend on version 2.2
BUG/MEDIUM: http: unbreak redirects in legacy mode
BUG/CRITICAL: hpack: never index a header into the headroom after wrapping
---