Skip to content

Conversation

@update-openssl-envoy
Copy link

Generated by envoy-sync-receive.sh

phlax and others added 5 commits December 3, 2025 14:49
selected backport of #42317

Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Ryan Northey <[email protected]>
So that `%START_TIME_LOCAL%` works in the logs.

Fixes: #42313

Signed-off-by: Jonh Wendell <[email protected]>
agrawroh and others added 6 commits December 3, 2025 18:12
…ct is enabled (#42024)

This PR fixes a connection leak in the TCP proxy when the
`receive_before_connect` feature is enabled and the downstream
connection closes before the upstream connection is established.

After this, the TCP Proxy should properly propagates the end-of-stream
signal to the upstream connection even when no data gets received from
the downstream, preventing upstream connection leaks.

Fix envoyproxy/envoy#42006

---

**Commit Message**: tcp_proxy: fixes a cx leak in the TCP Proxy when
receive_before_connect is enabled
**Additional Description:** Fixed a connection leak in the TCP proxy
when the `receive_before_connect` feature is enabled and the downstream
connection closes before the upstream connection is established.
**Risk Level:** Low
**Testing:** Added Tests
**Docs Changes:** N/A
**Release Notes:** Added

Signed-off-by: Rohit Agrawal <[email protected]>
Certificates with an OTHERNAME SAN using type `V_ASN1_UNIVERSALSTRING`
or `V_ASN1_BMPSTRING` with an embedded null would have the name
truncated at the first null, resulting in an incorrect check.

Signed-off-by: Greg Greenway <[email protected]>
Signed-off-by: Yan Avlasov <[email protected]>
* Security fixes:
  - CVE-2025-64527: Envoy crashes when JWT authentication is configured with the remote JWKS fetching
  - CVE-2025-66220: TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte
  - CVE-2025-64763: Potential request smuggling from early data after the CONNECT upgrade

**Docker images**:
    https://hub.docker.com/r/envoyproxy/envoy/tags?page=1&name=v1.34.11
**Docs**:
    https://www.envoyproxy.io/docs/envoy/v1.34.11/
**Release notes**:
    https://www.envoyproxy.io/docs/envoy/v1.34.11/version_history/v1.34/v1.34.11
**Full changelog**:
    envoyproxy/envoy@v1.34.10...v1.34.11
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 3 times, most recently from a08f8ba to 2157058 Compare December 4, 2025 12:11
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 14 times, most recently from 4531b1c to 055de61 Compare December 8, 2025 00:26
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch 4 times, most recently from a103c6d to b4af4ff Compare December 9, 2025 00:26
…ssl[release/v1.34]

* upstream/release/v1.34:
  repo: Dev v1.34.12
  repo: Release v1.34.11
  changelogs/1.34.11: Add summary
  Add option to reject early CONNECT data
  fix jwt_auth crash with two or more auth header
  tls: fix SAN validation for OTHERNAME types with embedded nulls Certificates with an OTHERNAME SAN using type `V_ASN1_UNIVERSALSTRING` or `V_ASN1_BMPSTRING` with an embedded null would have the name truncated at the first null, resulting in an incorrect check.
  tcp_proxy: fixes a cx leak in the TCP Proxy when receive_before_connect is enabled (#42024)
  distribution/docker: Bump Ubuntu -> 104ae837 (#42337)
  distribution/docker: Install tzdata (#42338)
  bazel: Bump -> 7.7.1 (#42295)
  bazelrc: Add compatibility with repo settings
  github/ci: Fix request workflow (#42355)

Signed-off-by: jwendell <[email protected]>
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-34 branch from b4af4ff to 769bf4d Compare December 9, 2025 06:09
@github-actions github-actions bot merged commit 334cbaf into release/v1.34 Dec 9, 2025
1 of 2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants