Hi,

HAProxy 2.6.9 was released on 2023/02/14. It added 35 new commits
after version 2.6.8.

The main reason for this release today is the availability of a fix for the
vulnerability explained in the other thread (CVE-2023-25725).

In addition, this version addresses the following issues:
  - a risk of crash in QUIC when "option nolinger" is present, when
    dealing with 1-RTT packets, or when no space is available to send
    trailers or H3 SETTINGS frames.

  - a regression from a previous fix that caused some server-side
    connection not to expire if some unsent data are blocked in the
    request channel.

  - a 13-years old issue with the expiration of old entries in stick-
    tables that slows down eviction at every timer period rollover
    (49.7 days), making the table size and memory usage grow for a
    while until all of them were either refreshed or expired. I'm
    still puzzled that 3 users apparently noticed it at the same time
    around last rollover on Jan 30th.

  - hot-adding a server via the CLI could result in it not taking
    traffic if its "maxconn" value was set and not the "minconn" one,
    causing 503 to be returned.

  - file-backed rings used by traces were not properly unmapped before
    being closed, sometimes resulting in losing the latest updates.

  - a bug in the SSL cache eviction that affected WolfSSL was fixed, but
    it's unclear if it could affect other libs (openssl was apparently not
    due to fixed-size records)

  - a warning will be emitted when a crt-list line is malformed.

  - minor doc fixes

The changes are intentionally limited so that all users of 2.6.8 and older
can update without taking risks.

Please find the usual URLs below :
   Site index       : https://www.haproxy.org/
   Documentation    : https://docs.haproxy.org/
   Wiki             : https://github.com/haproxy/wiki/wiki
   Discourse        : https://discourse.haproxy.org/
   Slack channel    : https://slack.haproxy.org/
   Issue tracker    : https://github.com/haproxy/haproxy/issues
   Sources          : 
https://www.haproxy.org/download/20230214-cve-2023-25725/src/
   Git repository   : 
https://git.haproxy.org/git/haproxy-20230214-cve-2023-25725.git/
   Git Web browsing : 
https://git.haproxy.org/?p=haproxy-20230214-cve-2023-25725.git
   Changelog        : 
https://www.haproxy.org/download/20230214-cve-2023-25725/src/CHANGELOG
   Dataplane API    : 
https://github.com/haproxytech/dataplaneapi/releases/latest
   Pending bugs     : https://www.haproxy.org/l/pending-bugs
   Reviewed bugs    : https://www.haproxy.org/l/reviewed-bugs
   Code reports     : https://www.haproxy.org/l/code-reports
   Latest builds    : https://www.haproxy.org/l/dev-packages

Willy
---
Complete changelog :
Aleksey Ponomaryov (1):
      BUG/MEDIUM: stick-table: do not leave entries in end of window during 
purge

Amaury Denoyelle (4):
      MINOR: mux-quic/h3: define stream close callback
      BUG/MEDIUM: h3: handle STOP_SENDING on control stream
      BUG/MINOR: h3: fix crash due to h3 traces
      BUG/MEDIUM: quic: do not split STREAM frames if no space

Aurelien DARRAGON (12):
      DEV: hpack: fix `trash` build regression
      BUG/MINOR: fcgi-app: prevent 'use-fcgi-app' in default section
      BUG/MINOR: stats: use proper buffer size for http dump
      BUG/MINOR: stats: fix source buffer size for http dump
      BUG/MEDIUM: stats: fix resolvers dump
      BUG/MINOR: stats: fix ctx->field update in stats_dump_proxy_to_buffer()
      BUG/MINOR: stats: fix show stats field ctx for servers
      BUG/MINOR: stats: fix STAT_STARTED behavior with full htx
      DOC: config: fix option spop-check proxy compatibility
      DOC: config: 'http-send-name-header' option may be used in default section
      MINOR: cfgparse/server: move (min/max)conn postparsing logic into 
dedicated function
      BUG/MINOR: server/add: ensure minconn/maxconn consistency when adding 
server

Christopher Faulet (1):
      BUG/MEDIUM: stconn: Schedule a shutw on shutr if data must be sent first

Frédéric Lécaille (7):
      BUG/MINOR: quic: Possible stream truncations under heavy loss
      BUG/MINOR: quic: Too big PTO during handshakes
      BUG/MINOR: quic: Do not ignore coalesced packets in qc_prep_fast_retrans()
      MINOR: quic: When probing Handshake packet number space, also probe the 
Initial one
      BUG/MAJOR: quic: Possible crash when processing 1-RTT during 0-RTT session
      MEDIUM: quic: Remove qc_conn_finalize() from the ClientHello TLS callbacks
      BUG/MINOR: quic: Unchecked source connection ID

William Lallemand (2):
      BUG/MEDIUM: ssl: wrong eviction from the session cache tree
      BUG/MINOR: ssl/crt-list: warn when a line is malformated

Willy Tarreau (8):
      BUG/MINOR: sink: make sure to always properly unmap a file-backed ring
      DEV: haring: add a new option "-r" to automatically repair broken files
      BUG/MINOR: log: release global log servers on exit
      BUG/MINOR: sink: free the forwarding task on exit
      BUG/MEDIUM: cache: use the correct time reference when comparing dates
      BUG/MEDIUM: quic: fix crash when "option nolinger" is set in the frontend
      DOC: proxy-protocol: fix wrong byte in provided example
      BUG/CRITICAL: http: properly reject empty http header field names

---

Reply via email to