Hi,
HAProxy 2.6.9 was released on 2023/02/14. It added 35 new commits
after version 2.6.8.
The main reason for this release today is the availability of a fix for the
vulnerability explained in the other thread (CVE-2023-25725).
In addition, this version addresses the following issues:
- a risk of crash in QUIC when "option nolinger" is present, when
dealing with 1-RTT packets, or when no space is available to send
trailers or H3 SETTINGS frames.
- a regression from a previous fix that caused some server-side
connection not to expire if some unsent data are blocked in the
request channel.
- a 13-years old issue with the expiration of old entries in stick-
tables that slows down eviction at every timer period rollover
(49.7 days), making the table size and memory usage grow for a
while until all of them were either refreshed or expired. I'm
still puzzled that 3 users apparently noticed it at the same time
around last rollover on Jan 30th.
- hot-adding a server via the CLI could result in it not taking
traffic if its "maxconn" value was set and not the "minconn" one,
causing 503 to be returned.
- file-backed rings used by traces were not properly unmapped before
being closed, sometimes resulting in losing the latest updates.
- a bug in the SSL cache eviction that affected WolfSSL was fixed, but
it's unclear if it could affect other libs (openssl was apparently not
due to fixed-size records)
- a warning will be emitted when a crt-list line is malformed.
- minor doc fixes
The changes are intentionally limited so that all users of 2.6.8 and older
can update without taking risks.
Please find the usual URLs below :
Site index : https://www.haproxy.org/
Documentation : https://docs.haproxy.org/
Wiki : https://github.com/haproxy/wiki/wiki
Discourse : https://discourse.haproxy.org/
Slack channel : https://slack.haproxy.org/
Issue tracker : https://github.com/haproxy/haproxy/issues
Sources :
https://www.haproxy.org/download/20230214-cve-2023-25725/src/
Git repository :
https://git.haproxy.org/git/haproxy-20230214-cve-2023-25725.git/
Git Web browsing :
https://git.haproxy.org/?p=haproxy-20230214-cve-2023-25725.git
Changelog :
https://www.haproxy.org/download/20230214-cve-2023-25725/src/CHANGELOG
Dataplane API :
https://github.com/haproxytech/dataplaneapi/releases/latest
Pending bugs : https://www.haproxy.org/l/pending-bugs
Reviewed bugs : https://www.haproxy.org/l/reviewed-bugs
Code reports : https://www.haproxy.org/l/code-reports
Latest builds : https://www.haproxy.org/l/dev-packages
Willy
---
Complete changelog :
Aleksey Ponomaryov (1):
BUG/MEDIUM: stick-table: do not leave entries in end of window during
purge
Amaury Denoyelle (4):
MINOR: mux-quic/h3: define stream close callback
BUG/MEDIUM: h3: handle STOP_SENDING on control stream
BUG/MINOR: h3: fix crash due to h3 traces
BUG/MEDIUM: quic: do not split STREAM frames if no space
Aurelien DARRAGON (12):
DEV: hpack: fix `trash` build regression
BUG/MINOR: fcgi-app: prevent 'use-fcgi-app' in default section
BUG/MINOR: stats: use proper buffer size for http dump
BUG/MINOR: stats: fix source buffer size for http dump
BUG/MEDIUM: stats: fix resolvers dump
BUG/MINOR: stats: fix ctx->field update in stats_dump_proxy_to_buffer()
BUG/MINOR: stats: fix show stats field ctx for servers
BUG/MINOR: stats: fix STAT_STARTED behavior with full htx
DOC: config: fix option spop-check proxy compatibility
DOC: config: 'http-send-name-header' option may be used in default section
MINOR: cfgparse/server: move (min/max)conn postparsing logic into
dedicated function
BUG/MINOR: server/add: ensure minconn/maxconn consistency when adding
server
Christopher Faulet (1):
BUG/MEDIUM: stconn: Schedule a shutw on shutr if data must be sent first
Frédéric Lécaille (7):
BUG/MINOR: quic: Possible stream truncations under heavy loss
BUG/MINOR: quic: Too big PTO during handshakes
BUG/MINOR: quic: Do not ignore coalesced packets in qc_prep_fast_retrans()
MINOR: quic: When probing Handshake packet number space, also probe the
Initial one
BUG/MAJOR: quic: Possible crash when processing 1-RTT during 0-RTT session
MEDIUM: quic: Remove qc_conn_finalize() from the ClientHello TLS callbacks
BUG/MINOR: quic: Unchecked source connection ID
William Lallemand (2):
BUG/MEDIUM: ssl: wrong eviction from the session cache tree
BUG/MINOR: ssl/crt-list: warn when a line is malformated
Willy Tarreau (8):
BUG/MINOR: sink: make sure to always properly unmap a file-backed ring
DEV: haring: add a new option "-r" to automatically repair broken files
BUG/MINOR: log: release global log servers on exit
BUG/MINOR: sink: free the forwarding task on exit
BUG/MEDIUM: cache: use the correct time reference when comparing dates
BUG/MEDIUM: quic: fix crash when "option nolinger" is set in the frontend
DOC: proxy-protocol: fix wrong byte in provided example
BUG/CRITICAL: http: properly reject empty http header field names
---