Hi, HAProxy 1.8.25 was released on 2020/04/02. It added 37 new commits after version 1.8.24.
The main driver for this release is that it contains a fix for a serious vulnerability that was responsibly reported last week by Felix Wilhelm from Google Project Zero, affecting the HPACK decoder used for HTTP/2. CVE-2020-11100 was assigned to this issue. For version 1.8 it is enough to remove "npn h2" and "alpn h2" on "bind" lines to disable HTTP/2 support and stay away from the issue. But upgrading will be way easier and safer! This vulnerability makes it possible under certain circumstances to write to a wide range of memory locations within the process' heap, with the limitation that the attacker doesn't control the absolute address, so the most likely result and by a far margin will be a process crash, but it is not possible to completely rule out the faint possibility of a remote code execution, at least in a lab-controlled environment. Felix was kind enough to agree to delay the publication of his findings to the 20th of this month in order to leave enough time to haproxy users to apply updates. But please do not wait, as it is not very difficult to figure how to exploit the bug based on the fix. Distros were notified and will also have fixes available very shortly. Two other important fixes are present in this version: - a non-portable way of calculating a list pointer that breaks with gcc 10 unless using -fno-tree-pta. This bug results in infinite loops at random places in the code depending how the compiler decides to optimize the code. - a bug in the way TLV fields are extracted from the PROXY protocol, as they could be mistakenly looked up in the subsequent payload, even though these would have limited effects since these ones would generally be meaningless for the transported protocol, but could be used to hide a source address from logging for example. The rest is less important, but still relevant to some users. Please have a look at the changelog below for a more detailed list of fixes, and do not forget to update, either from the sources or from your regular distro channels. Please find the usual URLs below : Site index : http://www.haproxy.org/ Discourse : http://discourse.haproxy.org/ Slack channel : https://slack.haproxy.org/ Issue tracker : https://github.com/haproxy/haproxy/issues Sources : http://www.haproxy.org/download/1.8/src/ Git repository : http://git.haproxy.org/git/haproxy-1.8.git/ Git Web browsing : http://git.haproxy.org/?p=haproxy-1.8.git Changelog : http://www.haproxy.org/download/1.8/src/CHANGELOG Cyril's HTML doc : http://cbonte.github.io/haproxy-dconv/ Willy --- Complete changelog : Bjoern Jacke (1): DOC: fix typo about no-tls-tickets Björn Jacke (1): DOC: improve description of no-tls-tickets Christopher Faulet (8): BUG/MINOR: lua: Ignore the reserve to know if a channel is full or not BUG/MINOR: http-rules: Preserve FLT_END analyzers on reject action BUG/MINOR: http-rules: Fix a typo in the reject action function BUG/MINOR: rules: Preserve FLT_END analyzers on silent-drop action BUG/MINOR: rules: Increment be_counters if backend is assigned for a silent-drop MINOR: http-rules: Add a flag on redirect rules to know the rule direction MINOR: http-rules: Handle the rule direction when a redirect is evaluated BUG/MINOR: http-ana: Reset request analysers on error when waiting for response Daniel Corbett (1): BUG/MINOR: stats: Fix color of draining servers on stats page Ilya Shipitsin (1): DOC: assorted typo fixes in the documentation Jerome Magnin (1): BUG/MINOR: http_ana: make sure redirect flags don't have overlapping bits Lukas Tribus (1): DOC: ssl: clarify security implications of TLS tickets Miroslav Zagorac (1): DOC: internals: Fix spelling errors in filters.txt Tim Duesterhus (3): BUG/MINOR: sample: Make sure to return stable IDs in the unique-id fetch BUG/MAJOR: proxy_protocol: Properly validate TLV lengths DOC: proxy_protocol: Reserve TLV type 0x05 as PP2_TYPE_UNIQUE_ID William Dauchy (1): BUG/MINOR: namespace: avoid closing fd when socket failed in my_socketat William Lallemand (2): BUG/MINOR: peers: init bind_proc to 1 if it wasn't initialized BUG/MINOR: peers: avoid an infinite loop with peers_fe is NULL Willy Tarreau (16): SCRIPTS: announce-release: use mutt -H instead of -i to include the draft CONTRIB: debug: add the possibility to decode the value as certain types only CONTRIB: debug: support reporting multiple values at once CONTRIB: debug: also support reading values from stdin BUG/MEDIUM: shctx: make sure to keep all blocks aligned MINOR: compiler: move CPU capabilities definition from config.h and complete them BUG/MEDIUM: ebtree: don't set attribute packed without unaligned access support BUILD: fix recent build failure on unaligned archs MINOR: compiler: add new alignment macros BUILD: ebtree: improve architecture-specific alignment BUG/MINOR: sample: fix the json converter's endian-sensitivity BUG/MAJOR: list: fix invalid element address calculation DOC: fix incorrect indentation of http_auth_* REGTEST: make the PROXY TLV validation depend on version 2.2 BUG/MEDIUM: http: unbreak redirects in legacy mode BUG/CRITICAL: hpack: never index a header into the headroom after wrapping ---