-
Notifications
You must be signed in to change notification settings - Fork 4.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
**Summary of changes** [CVE-2024-45808](GHSA-p222-xhp9-39rc): Malicious log injection via access logs [CVE-2024-45806](GHSA-ffhv-fvxq-r6mf): Potential manipulate `x-envoy` headers from external sources [CVE-2024-45809](GHSA-wqr5-qmq7-3qw3): Jwt filter crash in the clear route cache with remote JWKs [CVE-2024-45810](GHSA-qm74-x36m-555q): Envoy crashes for LocalReply in http async client **Docker images**: https://hub.docker.com/r/envoyproxy/envoy/tags?page=1&name=v1.30.6 **Docs**: https://www.envoyproxy.io/docs/envoy/v1.30.6/ **Release notes**: https://www.envoyproxy.io/docs/envoy/v1.30.6/version_history/v1.30/v1.30.6 **Full changelog**: v1.30.5...v1.30.6 Signed-off-by: Boteng Yao <boteng@google.com> Signed-off-by: Ryan Northey <ryan@synca.io>
- Loading branch information
1 parent
ecddba7
commit 810bfcb
Showing
8 changed files
with
54 additions
and
15 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
1.30.6-dev | ||
1.30.6 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
date: September 19, 2024 | ||
|
||
behavior_changes: | ||
- area: http | ||
change: | | ||
The default configuration of Envoy will continue to trust internal addresses while in the future it will not trust them by default. | ||
If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary ``x-envoy`` | ||
headers) please explictily include those addresses or CIDR ranges into :ref:`internal_address_config | ||
<envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.internal_address_config>` | ||
See the config examples from the above ``internal_address_config`` link. This default no trust internal address can be turned on by | ||
setting runtime guard ``envoy.reloadable_features.explicit_internal_address_config`` to ``true``. | ||
minor_behavior_changes: | ||
- area: access_log | ||
change: | | ||
Sanitize SNI for potential log injection. The invalid character will be replaced by ``_`` with an ``invalid:`` marker. If runtime | ||
flag ``envoy.reloadable_features.sanitize_sni_in_access_log`` is set to ``false``, the sanitize behavior is disabled. | ||
bug_fixes: | ||
- area: http_async_client | ||
change: | | ||
Fixed the local reply and destroy order crashes when using the http async client for websocket handshake. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
date: September 19, 2024 | ||
|
||
behavior_changes: | ||
- area: http | ||
change: | | ||
The default configuration of Envoy will continue to trust internal addresses while in the future it will not trust them by default. | ||
If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary ``x-envoy`` | ||
headers) please explictily include those addresses or CIDR ranges into :ref:`internal_address_config | ||
<envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.internal_address_config>` | ||
See the config examples from the above ``internal_address_config`` link. This default no trust internal address can be turned on by | ||
setting runtime guard ``envoy.reloadable_features.explicit_internal_address_config`` to ``true``. | ||
minor_behavior_changes: | ||
- area: access_log | ||
change: | | ||
Sanitize SNI for potential log injection. The invalid character will be replaced by ``_`` with an ``invalid:`` marker. If runtime | ||
flag ``envoy.reloadable_features.sanitize_sni_in_access_log`` is set to ``false``, the sanitize behavior is disabled. | ||
bug_fixes: | ||
- area: jwt | ||
change: | | ||
Fixed a bug where using ``clear_route_cache`` with remote JWKs works | ||
incorrectly and may cause a crash when the modified request does not match | ||
any route. | ||
- area: http_async_client | ||
change: | | ||
Fixed the local reply and destroy order crashes when using the http async client for websocket handshake. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file not shown.
Binary file not shown.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters