Skip to content

Commit 4ee5e56

Browse files
publish-envoy[bot]phlax
authored andcommitted
repo: Dev v1.37.2
Signed-off-by: Ryan Northey <ryan@synca.io>
1 parent 5ef4e4c commit 4ee5e56

4 files changed

Lines changed: 80 additions & 88 deletions

File tree

VERSION.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.37.1
1+
1.37.2-dev

changelogs/1.37.1.yaml

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
date: March 11, 2026
2+
3+
bug_fixes:
4+
- area: oauth2
5+
change: |
6+
Fixed OAuth2 refresh requests so host rewriting no longer overrides the original ``Host`` header value.
7+
- area: ext_proc
8+
change: |
9+
Fixed a bug to support two ext_proc filters configured in the chain. This change can be reverted by setting
10+
the runtime guard ``envoy.reloadable_features.ext_proc_inject_data_with_state_update`` to ``false``.
11+
- area: ext_proc
12+
change: |
13+
Fixed message-valued CEL attribute serialization (for example
14+
``xds.virtual_host_metadata``) to use protobuf text format instead of debug string output.
15+
This restores ext_proc compatibility with protobuf 30+ where debug-string output is
16+
intentionally not parseable (for example ``goo.gle/debugonly`` prefixes). This change can
17+
be reverted by setting runtime guard
18+
``envoy.reloadable_features.cel_message_serialize_text_format`` to ``false``.
19+
- area: ratelimit
20+
change: |
21+
Fixed a bug in the gRPC rate limit client where the client could get into a bad state if the
22+
callbacks were not properly released after a request completion, leading to potential use-after-free
23+
issues. The fix ensures that callbacks and request references are cleared after completion, and adds
24+
assertions to enforce correct usage patterns.
25+
- area: ext_authz
26+
change: |
27+
Fixed a bug where headers from a denied authorization response (non-200) were not properly propagated
28+
to the client.
29+
- area: ext_authz
30+
change: |
31+
Fixed the HTTP ext_authz client to respect ``status_on_error`` configuration when the authorization
32+
server returns a 5xx error or when HTTP call failures occur. Previously, these error scenarios always
33+
returned 403 Forbidden regardless of the configured error status.
34+
- area: release
35+
change: |
36+
Published contrib binaries now include the ``-contrib`` suffix in their version string.
37+
- area: access_log
38+
change: |
39+
Fixed a crash on listener removal with a process-level access log rate limiter
40+
:ref:`ProcessRateLimitFilter <envoy_v3_api_msg_extensions.access_loggers.filters.process_ratelimit.v3.ProcessRateLimitFilter>`.
41+
- area: http
42+
change: |
43+
Fixed an issue where filter chain execution could continue on HTTP streams that had been reset but not yet
44+
destroyed. This could cause use-after-free conditions when filter callbacks were invoked on filters that
45+
had already received ``onDestroy()``. The fix ensures that ``decodeHeaders()``, ``decodeData()``,
46+
``decodeTrailers()``, and ``decodeMetadata()`` are blocked after a downstream reset.
47+
- area: json
48+
change: |
49+
Fixed an off-by-one write in ``JsonEscaper::escapeString()`` that could corrupt the string null terminator
50+
when the input string ends with a control character.
51+
- area: network
52+
change: |
53+
Fixed a crash in ``Utility::getAddressWithPort`` when called with a scoped IPv6 address (e.g., ``fe80::1%eth0``).
54+
- area: rbac
55+
change: |
56+
Fixed RBAC header matcher to validate each header value individually instead of concatenating multiple header values
57+
into a single string. This prevents potential bypasses when requests contain multiple values for the same header.
58+
The new behavior is enabled by the runtime guard ``envoy.reloadable_features.rbac_match_headers_individually``.
59+
60+
new_features:
61+
- area: dynamic modules
62+
change: |
63+
Introduced the extended ABI forward compatibility mechanism for dynamic modules
64+
where modules built with a SDK version can be loaded by Envoy
65+
binaries of the next Envoy version. For example, A module built with the v1.38 SDK
66+
can now be loaded by an Envoy binary of v1.39.

changelogs/current.yaml

Lines changed: 13 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,17 @@
1-
date: March 11, 2026
1+
date: Pending
2+
3+
behavior_changes:
4+
# *Changes that are expected to cause an incompatibility if applicable; deployment changes are likely required*
5+
6+
minor_behavior_changes:
7+
# *Changes that may cause incompatibilities for some users, but should not for most*
28

39
bug_fixes:
4-
- area: oauth2
5-
change: |
6-
Fixed OAuth2 refresh requests so host rewriting no longer overrides the original ``Host`` header value.
7-
- area: ext_proc
8-
change: |
9-
Fixed a bug to support two ext_proc filters configured in the chain. This change can be reverted by setting
10-
the runtime guard ``envoy.reloadable_features.ext_proc_inject_data_with_state_update`` to ``false``.
11-
- area: ext_proc
12-
change: |
13-
Fixed message-valued CEL attribute serialization (for example
14-
``xds.virtual_host_metadata``) to use protobuf text format instead of debug string output.
15-
This restores ext_proc compatibility with protobuf 30+ where debug-string output is
16-
intentionally not parseable (for example ``goo.gle/debugonly`` prefixes). This change can
17-
be reverted by setting runtime guard
18-
``envoy.reloadable_features.cel_message_serialize_text_format`` to ``false``.
19-
- area: ratelimit
20-
change: |
21-
Fixed a bug in the gRPC rate limit client where the client could get into a bad state if the
22-
callbacks were not properly released after a request completion, leading to potential use-after-free
23-
issues. The fix ensures that callbacks and request references are cleared after completion, and adds
24-
assertions to enforce correct usage patterns.
25-
- area: ext_authz
26-
change: |
27-
Fixed a bug where headers from a denied authorization response (non-200) were not properly propagated
28-
to the client.
29-
- area: ext_authz
30-
change: |
31-
Fixed the HTTP ext_authz client to respect ``status_on_error`` configuration when the authorization
32-
server returns a 5xx error or when HTTP call failures occur. Previously, these error scenarios always
33-
returned 403 Forbidden regardless of the configured error status.
34-
- area: release
35-
change: |
36-
Published contrib binaries now include the ``-contrib`` suffix in their version string.
37-
- area: access_log
38-
change: |
39-
Fixed a crash on listener removal with a process-level access log rate limiter
40-
:ref:`ProcessRateLimitFilter <envoy_v3_api_msg_extensions.access_loggers.filters.process_ratelimit.v3.ProcessRateLimitFilter>`.
41-
- area: http
42-
change: |
43-
Fixed an issue where filter chain execution could continue on HTTP streams that had been reset but not yet
44-
destroyed. This could cause use-after-free conditions when filter callbacks were invoked on filters that
45-
had already received ``onDestroy()``. The fix ensures that ``decodeHeaders()``, ``decodeData()``,
46-
``decodeTrailers()``, and ``decodeMetadata()`` are blocked after a downstream reset.
47-
- area: json
48-
change: |
49-
Fixed an off-by-one write in ``JsonEscaper::escapeString()`` that could corrupt the string null terminator
50-
when the input string ends with a control character.
51-
- area: network
52-
change: |
53-
Fixed a crash in ``Utility::getAddressWithPort`` when called with a scoped IPv6 address (e.g., ``fe80::1%eth0``).
54-
- area: rbac
55-
change: |
56-
Fixed RBAC header matcher to validate each header value individually instead of concatenating multiple header values
57-
into a single string. This prevents potential bypasses when requests contain multiple values for the same header.
58-
The new behavior is enabled by the runtime guard ``envoy.reloadable_features.rbac_match_headers_individually``.
10+
# *Changes expected to improve the state of the world and are unlikely to have negative effects*
11+
12+
removed_config_or_runtime:
13+
# *Normally occurs at the end of the* :ref:`deprecation period <deprecated>`
5914

6015
new_features:
61-
- area: dynamic modules
62-
change: |
63-
Introduced the extended ABI forward compatibility mechanism for dynamic modules
64-
where modules built with a SDK version can be loaded by Envoy
65-
binaries of the next Envoy version. For example, A module built with the v1.38 SDK
66-
can now be loaded by an Envoy binary of v1.39.
16+
17+
deprecated:

changelogs/summary.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +0,0 @@
1-
**Summary of changes**:
2-
3-
* Security fixes:
4-
- [CVE-2026-26330](https://github.com/envoyproxy/envoy/security/advisories/GHSA-c23c-rp3m-vpg3): ratelimit: fix a bug where response phase limit may result in crash
5-
- [CVE-2026-26308](https://github.com/envoyproxy/envoy/security/advisories/GHSA-ghc4-35x6-crw5): fix multivalue header bypass in rbac
6-
- [CVE-2026-26310](https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p): network: fix crash in getAddressWithPort() when called with a scoped IPv6 address
7-
- [CVE-2026-26309](https://github.com/envoyproxy/envoy/security/advisories/GHSA-56cj-wgg3-x943): json: fixed an off-by-one write that could corrupted the string null terminator
8-
- [CVE-2026-26311](https://github.com/envoyproxy/envoy/security/advisories/GHSA-84xm-r438-86px): http: ensure decode* methods are blocked after a downstream reset
9-
10-
* Bug fixes:
11-
- oauth2: Fixed OAuth2 refresh requests so host rewriting no longer overrides the original `Host` header value.
12-
- ext_proc: Fixed a bug to support two ext_proc filters configured in the chain.
13-
- ext_proc: Fixed message-valued CEL attribute serialization to use protobuf text format instead of debug string output, restoring compatibility with protobuf 30+.
14-
- ext_authz: Fixed headers from denied authorization responses (non-200) not being properly propagated to the client.
15-
- ext_authz: Fixed the HTTP ext_authz client to respect `status_on_error` configuration when the authorization server returns a 5xx error or when HTTP call failures occur.
16-
- access_log: Fixed a crash on listener removal with a process-level access log rate limiter.
17-
18-
* Other changes:
19-
- release: Published contrib binaries now include the `-contrib` suffix in their version string and fixed distroless-contrib images.
20-
- dynamic modules: Introduced extended ABI forward compatibility mechanism for dynamic modules.
21-
22-
* Dependency updates:
23-
- Migrated googleurl source to GitHub (`google/gurl`).
24-
- Updated Kafka test binary to 3.9.2.
25-
- Updated Docker base images.

0 commit comments

Comments
 (0)