Change log for haproxy package in Ubuntu

76150 of 206 results
Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.13-2) unstable; urgency=medium

  * d/dconv: replace cgi.escape by html.escape. Closes: #951416.
  * d/copryight: document OpenSSL exception. Closes: #951782.
  * d/haproxy.cfg: use "ssl-min-ver" to set minimum version.
  * Apply one patch to fix an overflow in HTTP/2 header handling.
    Fix CVE-2020-11100.

 -- Vincent Bernat <email address hidden>  Wed, 01 Apr 2020 21:49:32 +0200
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.13-1ubuntu2) focal; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Add Ubuntu version to block automatic sync from Debian, as we want
      to stay in the 2.0.x LTS series for Focal (LP #1854988)
    - convert cgi.escape into html.escape to fix a python3.8 failure

 -- Gianfranco Costamagna <email address hidden>  Sun, 16 Feb 2020 10:34:53 +0100
Superseded in focal-proposed
haproxy (2.0.13-1ubuntu1) focal; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Add Ubuntu version to block automatic sync from Debian, as we want
      to stay in the 2.0.x LTS series for Focal (LP #1854988)

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.12-1ubuntu2) focal; urgency=medium

  * Use python3 to build the documentation (LP: #1858485, Closes: #948296):
    - d/control, d/rules: switch to python3
    - d/dconv/*: convert to python3
    - d/p/debianize-dconv.patch: small update for python3

 -- Andreas Hasenack <email address hidden>  Fri, 17 Jan 2020 18:54:13 +0000
Superseded in focal-proposed
haproxy (2.0.12-1ubuntu1) focal; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - Add Ubuntu version to block automatic sync from Debian, as we want
      to stay in the 2.0.x LTS series for Focal (LP #1854988)

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.11-1ubuntu1) focal; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - Add Ubuntu version to block automatic sync from Debian, as we want
      to stay in the 2.0.x LTS series for Focal (LP #1854988)

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.10-1ubuntu1) focal; urgency=medium

  * Add Ubuntu version to block automatic sync from Debian, as we want
    to stay in the 2.0.x LTS series for Focal (LP: #1854988)

 -- Andreas Hasenack <email address hidden>  Tue, 03 Dec 2019 15:38:53 -0300
Superseded in bionic-updates
Superseded in bionic-security
haproxy (1.8.8-1ubuntu0.9) bionic-security; urgency=medium

  * SECURITY UPDATE: Intermediary Encapsulation attacks
    - debian/patches/CVE-2019-19330-*.patch: reject header values containing
      invalid chars and make header field name filtering stronger in
      src/h2.c, include/common/ist.h, include/common/h2.h.
    - CVE-2019-19330

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 02 Dec 2019 12:38:31 -0300
Obsolete in disco-updates
Obsolete in disco-security
haproxy (1.8.19-1ubuntu1.3) disco-security; urgency=medium

  * SECURITY UPDATE: Intermediary Encapsulation attacks
    - debian/patches/CVE-2019-19330.patch: reject header values containing
      invalid chars and make header field name filtering stronger in
      src/h2.c, include/common/ist.h, include/common/h2.h.
    - CVE-2019-19330

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 02 Dec 2019 13:55:16 -0300
Superseded in eoan-updates
Superseded in eoan-security
haproxy (2.0.5-1ubuntu0.3) eoan-security; urgency=medium

  * SECURITY UPDATE: Intermediary Encapsulation attacks
    - debian/patches/CVE-2019-19330-*.patch: reject header values containing
      invalid chars and make header field name filtering stronger in
      src/h2.c, include/common/ist.h.
    - CVE-2019-19330

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 02 Dec 2019 16:12:00 -0300
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.10-1) unstable; urgency=medium

  * New upstream release.
    - BUG/MAJOR: h2: make header field name filtering stronger
    - BUG/MAJOR: h2: reject header values containing invalid chars
    - BUG/MAJOR: mux-h2: don't try to decode a response HEADERS frame in
                 idle state

 -- Vincent Bernat <email address hidden>  Tue, 26 Nov 2019 13:22:17 +0100

Available diffs

Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
haproxy (1.8.8-1ubuntu0.8) bionic; urgency=medium

  * d/p/lp-1848902-MINOR-systemd-consider-exit-status-143-as-successful.patch:
    fix potential hang in haproxy (LP: #1848902)

 -- Christian Ehrhardt <email address hidden>  Tue, 12 Nov 2019 13:16:22 +0100
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.9-1) unstable; urgency=medium

  * New upstream release.
    - BUG/MAJOR: stream-int: Don't receive data from mux until SI_ST_EST
                 is reached

 -- Vincent Bernat <email address hidden>  Sat, 16 Nov 2019 17:38:51 +0100

Available diffs

Superseded in eoan-updates
Superseded in eoan-security
haproxy (2.0.5-1ubuntu0.2) eoan-security; urgency=medium

  * SECURITY UPDATE: Messages with transfer-encoding header missing "chunked"
    value were not being correctly rejected
    - debian/patches/CVE-2019-18277.patch: also reject messages where
      "chunked" is missing from transfer-enoding in.
      src/proto_http.c.
    - CVE-2019-18277

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 04 Nov 2019 11:07:29 -0300
Superseded in disco-updates
Superseded in disco-security
haproxy (1.8.19-1ubuntu1.2) disco-security; urgency=medium

  * SECURITY UPDATE: Messages with transfer-encoding header missing "chunked"
    value were not being correctly rejected
    - debian/patches/CVE-2019-18277.patch: also reject messages where
      "chunked" is missing from transfer-enoding in.
      src/proto_http.c.
    - CVE-2019-18277

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 04 Nov 2019 11:04:10 -0300
Superseded in bionic-updates
Superseded in bionic-security
haproxy (1.8.8-1ubuntu0.7) bionic-security; urgency=medium

  * SECURITY UPDATE: Messages with transfer-encoding header missing "chunked"
    value were not being correctly rejected
    - debian/patches/CVE-2019-18277.patch: also reject messages where
      "chunked" is missing from transfer-enoding in.
      src/proto_http.c.
    - CVE-2019-18277

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 04 Nov 2019 11:03:13 -0300
Published in xenial-updates
Published in xenial-security
haproxy (1.6.3-1ubuntu0.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Messages with transfer-encoding header missing "chunked"
    value were not being correctly rejected
    - debian/patches/CVE-2019-18277.patch: also reject messages where
      "chunked" is missing from transfer-enoding in.
      src/proto_http.c.
    - CVE-2019-18277

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 25 Oct 2019 13:12:29 -0300
Superseded in eoan-updates
Deleted in eoan-proposed (Reason: moved to -updates)
haproxy (2.0.5-1ubuntu0.1) eoan; urgency=medium

  * Fix configurability of dh_params that regressed since building
    against openssl 1.1.1 (LP: #1841936)
    - d/p/lp-1841936-BUG-MEDIUM-ssl-tune.ssl.default-dh-param-value-ignor.patch
    - d/p/lp-1841936-CLEANUP-ssl-make-ssl_sock_load_dh_params-handle-errc.patch

 -- Christian Ehrhardt <email address hidden>  Wed, 23 Oct 2019 12:58:09 +0200
Superseded in disco-updates
Deleted in disco-proposed (Reason: moved to -updates)
haproxy (1.8.19-1ubuntu1.1) disco; urgency=medium

  * Fix configurability of dh_params that regressed since building
    against openssl 1.1.1 (LP: #1841936)
    - d/p/lp-1841936-BUG-MEDIUM-ssl-tune.ssl.default-dh-param-value-ignor.patch
    - d/p/lp-1841936-CLEANUP-ssl-make-ssl_sock_load_dh_params-handle-errc.patch

 -- Christian Ehrhardt <email address hidden>  Wed, 23 Oct 2019 12:34:38 +0200
Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
haproxy (1.8.8-1ubuntu0.6) bionic; urgency=medium

  * Fix issues around dh_params when building against openssl 1.1.1
    to avoid regressing the minimal key size (LP: 1841936)
    - d/p/lp-1841936-BUG-MEDIUM-ssl-tune.ssl.default-dh-param-value-ignor.patch
    - d/p/lp-1841936-CLEANUP-ssl-make-ssl_sock_load_dh_params-handle-errc.patch

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
haproxy (2.0.8-1) unstable; urgency=medium

  * New upstream release.
    - BUG/MAJOR: idle conns: schedule the cleanup task on the correct
                 threads

 -- Vincent Bernat <email address hidden>  Wed, 23 Oct 2019 08:55:55 +0200

Available diffs

Superseded in bionic-proposed
haproxy (1.8.8-1ubuntu0.5) bionic; urgency=medium

  * no change rebuild to pick up openssl 1.1.1 and via that
    TLSv1.3 (LP: #1841936)

 -- Christian Ehrhardt <email address hidden>  Tue, 03 Sep 2019 12:14:43 +0200
Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
haproxy (2.0.5-1) unstable; urgency=medium

  * New upstream release.
    - BUG/MEDIUM: mux_h1: Don't bother subscribing in recv if we're not
                  connected.
    - BUG/MEDIUM: mux_pt: Don't call unsubscribe if we did not subscribe.
    - BUG/MEDIUM: proxy: Don't forget the SF_HTX flag when upgrading
                  TCP=>H1+HTX.
    - BUG/MEDIUM: proxy: Don't use cs_destroy() when freeing the
                  conn_stream.
    - BUG/MEDIUM: stick-table: Wrong stick-table backends parsing.

 -- Vincent Bernat <email address hidden>  Fri, 16 Aug 2019 19:51:24 +0200

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
haproxy (2.0.4-1) unstable; urgency=medium

  * New upstream release. Upload to unstable.
    - BUG/MAJOR: http/sample: use a static buffer for raw -> htx
                 conversion
    - BUG/MAJOR: queue/threads: avoid an AB/BA locking issue in
                 process_srv_queue()
  * d/haproxy.cfg: update default cipher lists to more secure defaults.
    TLSv1.0 and TLSv1.1 are disabled, as well as TLS tickets (they are
    breaking forward secrecy unless correctly rotated).
    Closes: #932763.

 -- Vincent Bernat <email address hidden>  Fri, 09 Aug 2019 14:22:23 +0200
Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
haproxy (2.0.3-1ubuntu1) eoan; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
      generate traffic through haproxy.
      [Updated to use "service" instead of "systemctl" to match what was
      submitted to Debian.]
  * Dropped:
    - SECURITY UPDATE: DoS in htx_manage_client_side_cookies
      + debian/patches/CVE-2019-14241.patch: fix parsing of malformed cookies
        which start by a delimiter in src/proto_htx.c.
      + CVE-2019-14241
      [Fixed upstream]

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
haproxy (2.0.1-1ubuntu2) eoan; urgency=medium

  * SECURITY UPDATE: DoS in htx_manage_client_side_cookies
    - debian/patches/CVE-2019-14241.patch: fix parsing of malformed cookies
      which start by a delimiter in src/proto_htx.c.
    - CVE-2019-14241

 -- Marc Deslauriers <email address hidden>  Thu, 25 Jul 2019 13:04:51 -0400

Available diffs

Superseded in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
haproxy (2.0.1-1ubuntu1) eoan; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
      generate traffic through haproxy.
      [Updated to use "service" instead of "systemctl" to match what was
      submitted to Debian.]

Superseded in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
haproxy (1.8.19-1ubuntu1) disco; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
      generate traffic through haproxy.
      [Updated to use "service" instead of "systemctl" to match what was
      submitted to Debian.]

Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
haproxy (1.8.8-1ubuntu0.4) bionic; urgency=medium

  * d/p/stksess-align.patch: Make sure stksess is properly aligned.
    (LP: #1804069)
  * d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
    generate traffic through haproxy.

 -- Andreas Hasenack <email address hidden>  Thu, 24 Jan 2019 10:20:49 -0200
Obsolete in cosmic-updates
Deleted in cosmic-proposed (Reason: moved to -updates)
haproxy (1.8.13-2ubuntu0.2) cosmic; urgency=medium

  * d/p/stksess-align.patch: Make sure stksess is properly aligned.
    (LP: #1804069)
  * d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
    generate traffic through haproxy.

 -- Andreas Hasenack <email address hidden>  Wed, 23 Jan 2019 17:24:30 -0200
Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
haproxy (1.8.17-1ubuntu1) disco; urgency=medium

  * d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
    generate traffic through haproxy.

 -- Andreas Hasenack <email address hidden>  Thu, 24 Jan 2019 18:11:39 -0200
Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
haproxy (1.8.17-1) unstable; urgency=medium

  * New upstream version 1.8.17
    - BUG/MAJOR: stream-int: Update the stream expiration date in
      stream_int_notify()
    - BUG/MEDIUM: mux-h2: mark that we have too many CS once we have more than
      the max
    - BUG/MEDIUM: server: Also copy "check-sni" for server templates.
    - BUG/MEDIUM: cli: make "show sess" really thread-safe
    - BUG/MEDIUM: lua: dead lock when Lua tasks are trigerred
  * Drop CVE-2018-20615.patch; merged upstream

 -- Apollon Oikonomopoulos <email address hidden>  Mon, 14 Jan 2019 20:58:05 +0200

Available diffs

Superseded in cosmic-updates
Obsolete in cosmic-security
haproxy (1.8.13-2ubuntu0.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2018-20102.patch: check the bounds
      in src/dns.c.
    - CVE-2018-20102
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-20103.patch: fix in
      src/dns.c.
    - CVE-2018-20103
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-20615.patch: fix in
      src/mux_h2.c.
    - CVE-2018-20615

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 11 Jan 2019 12:37:38 -0300
Superseded in bionic-updates
Superseded in bionic-security
haproxy (1.8.8-1ubuntu0.3) bionic-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2018-20102.patch: check the bounds
      in src/dns.c.
    - CVE-2018-20102
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-20103.patch: fix in
      src/dns.c.
    - CVE-2018-20103
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-20615.patch: fix in
      src/mux_h2.c.
    - CVE-2018-20615

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 11 Jan 2019 11:06:19 -0300
Superseded in xenial-updates
Superseded in xenial-security
haproxy (1.6.3-1ubuntu0.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read
    - debian/patches/CVE-2018-20102.patch: check the bounds
      in src/dns.c.
    - CVE-2018-20102

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 11 Jan 2019 10:34:44 -0300
Superseded in disco-proposed
haproxy (1.8.16-2) unstable; urgency=high

  * Fix out-of-bounds read in HTTP2 mux (CVE-2018-20615).
    This would possibly lead to a crash in H2 HEADERS frame decoder when the
    PRIORITY flag is present, due to a missing frame size check.
  * Bump Standards-Version to 4.3.0; no changes needed.

 -- Apollon Oikonomopoulos <email address hidden>  Thu, 03 Jan 2019 12:08:07 +0200

Available diffs

Superseded in disco-proposed
haproxy (1.8.16-1) unstable; urgency=high

  * New upstream version 1.8.16.
    - BUG/MEDIUM: dns: Don't prevent reading the last byte of the payload
      in dns_validate_response()
    - BUG/MEDIUM: dns: overflowed dns name start position causing invalid
      dns error
  * d/rules: do not override CFLAGS, hijack DEBUG_CFLAGS for this instead.

 -- Vincent Bernat <email address hidden>  Sun, 23 Dec 2018 14:27:11 +0100

Available diffs

Superseded in disco-proposed
haproxy (1.8.15-1) unstable; urgency=high

  [ Vincent Bernat ]
  * d/rules: switch to pcre2. Closes: #911933.

  [ Apollon Oikonomopoulos ]
  * New upstream version 1.8.15
    - BUG: dns: Fix off-by-one write in dns_validate_dns_response() (
    - BUG: dns: Fix out-of-bounds read via signedness error in
      dns_validate_dns_response()
    - BUG: dns: Prevent out-of-bounds read in dns_read_name()
    - BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
      (CVE-2018-20102, closes: #916308)
    - BUG: dns: Prevent stack-exhaustion via recursion loop in dns_read_name
      (CVE-2018-20103, closes: #916307)
    - BUG/MAJOR: http: http_txn_get_path() may deference an inexisting buffer

 -- Apollon Oikonomopoulos <email address hidden>  Fri, 14 Dec 2018 15:31:04 +0200

Available diffs

Superseded in bionic-updates
Superseded in bionic-security
haproxy (1.8.8-1ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-14645.patch: fix in include/common/hpack-tbl.h,
      src/hpack-dec.c, src/hpack-tbl.c.
    - CVE-2018-14645

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 02 Oct 2018 08:32:44 -0300
Superseded in disco-release
Obsolete in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.13-2build1) cosmic; urgency=high

  * No change rebuild against openssl 1.1.1 with TLS 1.3 support.

 -- Dimitri John Ledkov <email address hidden>  Sat, 29 Sep 2018 01:36:44 +0100
Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
haproxy (1.8.14-1) unstable; urgency=medium

  * New upstream version.
    - BUG/CRITICAL: hpack: fix improper sign check on the header index
                    value (already fixed in 1.8.13-2)
    - BUG/MAJOR: kqueue: Don't reset the changes number by accident.
    - BUG/MAJOR: thread: lua: Wrong SSL context initialization.

 -- Vincent Bernat <email address hidden>  Sun, 23 Sep 2018 12:25:03 +0200
Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.13-2) unstable; urgency=high

  * Fix improper sign check on the HPACK header index value (CVE-2018-14645)
  * Bump Standards-Version to 4.2.1; no changes needed

 -- Apollon Oikonomopoulos <email address hidden>  Wed, 19 Sep 2018 22:46:58 +0300

Available diffs

Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.13-1) unstable; urgency=medium

  * New upstream version.
    - BUG/MEDIUM: h2: don't accept new streams if conn_streams are still
                  in excess
    - BUG/MEDIUM: h2: make sure the last stream closes the connection
                  after a timeout
    - BUG/MEDIUM: h2: never leave pending data in the output buffer on close
    - BUG/MEDIUM: h2: prevent orphaned streams from blocking a connection
                  forever
    - BUG/MEDIUM: stats: don't ask for more data as long as we're responding
    - BUG/MEDIUM: stream-int: don't immediately enable reading when the
                  buffer was reportedly full
    - BUG/MEDIUM: threads/sync: use sched_yield when available
    - BUG/MEDIUM: threads: Fix the exit condition of the thread barrier
    - BUG/MEDIUM: threads: properly fix nbthreads == MAX_THREADS
    - BUG/MEDIUM: threads: unbreak "bind" referencing an incorrect thread
                  number
  * d/patches: drop systemd exit status patch (applied upstream).

 -- Vincent Bernat <email address hidden>  Wed, 01 Aug 2018 11:36:20 +0200

Available diffs

Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.12-1) unstable; urgency=medium

  * New upstream version.
     - BUG/MAJOR: stick_table: Complete incomplete SEGV fix

 -- Vincent Bernat <email address hidden>  Wed, 27 Jun 2018 20:05:50 +0200

Available diffs

Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.11-1) unstable; urgency=medium

  * New upstream version.
    - BUG/MAJOR: Stick-tables crash with segfault when the key is not in
                 the stick-table

 -- Vincent Bernat <email address hidden>  Tue, 26 Jun 2018 18:26:05 +0200

Available diffs

Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.10-1) unstable; urgency=medium

  * New upstream version.
    - BUG/MAJOR: lua: Dead lock with sockets
    - BUG/MAJOR: map: fix a segfault when using http-request set-map
    - BUG/MAJOR: ssl: OpenSSL context is stored in non-reserved memory slot
    - BUG/MAJOR: ssl: Random crash with cipherlist capture
    - BUG/MEDIUM: cache: don't cache when an Authorization header is present
    - BUG/MEDIUM: dns: Delay the attempt to run a DNS resolution on check
                  failure.
    - BUG/MEDIUM: fd: Don't modify the update_mask in fd_dodelete().
    - BUG/MEDIUM: fd: Only check update_mask against all_threads_mask.
    - BUG/MEDIUM: servers: Add srv_addr default placeholder to the state file
    - BUG/MEDIUM: stick-tables: Decrement ref_cnt in table_* converters
    - BUG/MEDIUM: threads: Use the sync point to check active jobs and exit
    - BUG/MEDIUM: threads: handle signal queue only in thread 0
  * Remove patch from CVE. Included upstream.
  * d/patches: add a patch for clean stop with systemd.

 -- Vincent Bernat <email address hidden>  Fri, 22 Jun 2018 20:21:37 +0200

Available diffs

Superseded in bionic-updates
Superseded in bionic-security
haproxy (1.8.8-1ubuntu0.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Information disclosure
    - debian/patches/CVE-2018-11469.patch: fix in src/protp_http.c and
      adds some config notes.
    - CVE-2018-11469

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 29 May 2018 16:29:29 -0300
Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.9-2) unstable; urgency=high

  * d/patches: fix CVE-2018-11469: do not cache when an Authorization
    header is present. Closes: #900084.

 -- Vincent Bernat <email address hidden>  Sat, 26 May 2018 16:05:07 +0200

Available diffs

Superseded in cosmic-release
Deleted in cosmic-proposed (Reason: moved to release)
haproxy (1.8.9-1) unstable; urgency=medium

  * New upstream version.
    - BUG/MAJOR: channel: Fix crash when trying to read from a closed socket
    - BUG/MEDIUM: h2: implement missing support for chunked encoded uploads
    - BUG/MEDIUM: http: don't always abort transfers on CF_SHUTR
    - BUG/MEDIUM: lua: Fix segmentation fault if a Lua task exits
    - BUG/MEDIUM: pollers: Use a global list for fd shared between threads
    - BUG/MEDIUM: ssl: properly protect SSL cert generation
    - BUG/MEDIUM: task: Don't free a task that is about to be run
    - BUG/MEDIUM: threads: Fix the sync point for more than 32 threads
  * d/rsyslog.conf: use modern syntax and statements, thanks to Guillem
    Jover. Closes: #897914.

 -- Vincent Bernat <email address hidden>  Sat, 19 May 2018 15:00:17 +0200

Available diffs

Deleted in trusty-proposed (Reason: The package was removed due to its SRU bug(s) not being v...)
haproxy (1.4.24-2ubuntu0.5) trusty; urgency=medium

  * debian/haproxy.init: Ensure /run/haproxy exists and has the correct
    permissions on haproxy start (LP: #1755061).

 -- James Page <email address hidden>  Fri, 18 May 2018 10:02:06 +0100
Superseded in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
haproxy (1.8.8-1) unstable; urgency=high

  * New upstream version.
    - BUG/CRITICAL: h2: fix incorrect frame length check

 -- Vincent Bernat <email address hidden>  Thu, 19 Apr 2018 17:51:55 +0200

Available diffs

Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
haproxy (1.8.7-1) unstable; urgency=medium

  * New upstream version.
    - BUG/MAJOR: cache: always initialize newly created objects
  * d/control: switch maintainer address to tracker.debian.org.

 -- Vincent Bernat <email address hidden>  Sat, 07 Apr 2018 07:58:34 +0200

Available diffs

Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
haproxy (1.8.4-1) experimental; urgency=medium

  * New upstream stable release.
  * d/patches: document why dconv patch is not in series.
  * d/docs: ship NOTICE file in haproxy-doc.

 -- Vincent Bernat <email address hidden>  Sat, 10 Feb 2018 08:43:36 +0100
Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
haproxy (1.7.9-1ubuntu2) bionic; urgency=high

  * No change rebuild against openssl1.1.

 -- Dimitri John Ledkov <email address hidden>  Mon, 05 Feb 2018 16:49:35 +0000

Available diffs

Superseded in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.9-1ubuntu1) artful; urgency=medium

  * Backport of -x option from upstream haproxy to enable seamless
    reloading of haproxy without dropping connections.  This is enabled
    by adding
    " stats socket <stats file> expose-fd listeners
      stats bind-process 1 "
    to the global section of your haproxy config, and
    setting HAPROXY_STATS_SOCKET in the haproxy.service unit file.
    (LP: #1712925)

 -- Dave Chiluk <email address hidden>  Thu, 14 Sep 2017 12:32:36 -0500
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.9-1) unstable; urgency=medium

  * New upstream version release (see CHANGELOG):
    - BUG/MAJOR: lua/socket: resources not destroyed when the socket is
                 aborted
    - BUG/MEDIUM: lua: bad memory access
    - BUG/MEDIUM: http: Switch HTTP responses in TUNNEL mode when body
                  length is undefined

 -- Vincent Bernat <email address hidden>  Sat, 19 Aug 2017 12:05:02 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.8-1) unstable; urgency=medium

  * New upstream version release (see CHANGELOG):
    - BUG/MAJOR: cli: fix custom io_release was crushed by NULL.
    - BUG/MAJOR: compression: Be sure to release the compression state in
                 all cases
    - BUG/MAJOR: map: fix segfault during 'show map/acl' on cli.
    - BUG/MEDIUM: filters: Be sure to call flt_end_analyze for both
                  channels
    - BUG/MEDIUM: map/acl: fix unwanted flags inheritance.
  * Bump Standards-Version to 4.0.0. No changes needed.
  * Update d/watch to use https.

 -- Vincent Bernat <email address hidden>  Sat, 08 Jul 2017 08:24:35 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.7-1) unstable; urgency=medium

  * New upstream version release (see CHANGELOG):
    - BUG/MEDIUM: http: Drop the connection establishment when a redirect
                  is performed
    - BUG/MEDIUM: cfgparse: Check if tune.http.maxhdr is in the range
                  1..32767

 -- Vincent Bernat <email address hidden>  Mon, 26 Jun 2017 14:06:48 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.6-1) unstable; urgency=medium

  * New upstream version release (see CHANGELOG):
    - BUG/MAJOR: Use -fwrapv.
    - BUG/MAJOR: http: call manage_client_side_cookies() before erasing
                 the buffer
    - BUG/MAJOR: server: Segfault after parsing server state file.
    - BUG/MEDIUM: acl: don't free unresolved args in prune_acl_expr()
    - BUG/MEDIUM: acl: proprely release unused args in prune_acl_expr()
    - BUG/MEDIUM: arg: ensure that we properly unlink unresolved arguments
                  on error
    - BUG/MEDIUM: lua: memory leak
    - BUG/MEDIUM: lua: segfault if a converter or a sample doesn't return
                  anything
    - BUG/MEDIUM: peers: Peers CLOSE_WAIT issue.
    - BUG/MEDIUM: unix: never unlink a unix socket from the file system

 -- Vincent Bernat <email address hidden>  Sun, 18 Jun 2017 12:34:40 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.5-2) unstable; urgency=medium

  * Enable getaddrinfo() support, allowing resolution of hostnames to IPv6
    addresses (Closes: #862780). Thanks to Anton Eliasson
    <email address hidden>!

 -- Apollon Oikonomopoulos <email address hidden>  Wed, 17 May 2017 13:01:45 +0300

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
haproxy (1.7.5-1) unstable; urgency=medium

  * New upstream version release (see CHANGELOG):
    - BUG/MEDIUM: peers: fix buffer overflow control in intdecode.
    - BUG/MEDIUM: buffers: Fix how input/output data are injected into buffers
    - BUG/MEDIUM: http: Fix blocked HTTP/1.0 responses when compression is
      enabled

 -- Apollon Oikonomopoulos <email address hidden>  Tue, 04 Apr 2017 14:25:38 +0300

Available diffs

Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
haproxy (1.7.2-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + Fix a regression whereby fragmented requests were randomly flagged as
      bad requests depending on previous buffer contents; this was noticable
      under low load with authenticated requests.
    + Fix dynamic address resolution for IPv6-only hosts.
    + Make sure SSL sessions are not reused when the SNI changes. This makes
      SNI and SSL health checks play nice together.
    + Minor improvements:
      - Add the ability to perform actions on multiple servers via the stats
        page.
      - Add the ability to specify a custom HTTP reason field in generated
        responses.
      - New sample fetch function, `fc_rcvd_proxy', indicating wheter the
        PROXY protocol was used on the frontend for a connection or not.

 -- Apollon Oikonomopoulos <email address hidden>  Fri, 13 Jan 2017 14:49:05 +0200

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
haproxy (1.7.1-1) unstable; urgency=medium

  * New upstream stable release.
  * Upload to unstable.
  * Notable new features since 1.6:
    + SPOE (stream processing offload engine) : ability to delegate some
      slow, unreliable or dangerous processing to external processes.
    + More statistics in the CSV output.
    + Support of directories for config files: if the argument to -f
      is a directory, all files found there are loaded in alphabetical order.
    + It is now possible to set/unset/preset environment variables directly in
      the global section and query them through the CLI.
    + The CLI makes it possible to change a server's address, port, maxconn,
      check address and port at runtime, without reloading haproxy.
    + Support for multiple certificates: different certificates for the same
      domain so that the best one can be picked according to browser support.
      The main use is to be able to deliver ECDSA certificates to clients
      supporting them, without breaking compatibility with older clients.
    + SO_REUSEPORT is now configurable and can be disabled.
    + Updates to the Lua API, including new classes to access many internal
      objects like listeners, servers, proxies etc.
    + Support for a new type of maps consisting of regular expressions with
      replacement values.

 -- Apollon Oikonomopoulos <email address hidden>  Tue, 13 Dec 2016 12:32:32 +0200

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
haproxy (1.6.10-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + Fix retransmits in proxy mode and rare cases of unkillable tasks.
    + systemd wrapper: do not leave old processes behind when reloading too
      fast.
    + systemd wrapper: correctly set the status code.
    + Fix two bugs in the peers' task management possibly causing some
      CLOSE_WAIT connection after some rare race conditions.
    + Make SO_REUSEPORT use configurable via the "-dR" command line switch
      or the "noreuseport" config option in the global section.
  * B-D on libssl1.0-dev (Closes: #828337); upstream does not currently
    support OpenSSL 1.1 for the 1.6 series.
  * haproxy: depend on lsb-base for the initscript's use of
    /lib/lsb/init-functions.

 -- Apollon Oikonomopoulos <email address hidden>  Mon, 21 Nov 2016 11:46:16 +0200

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
haproxy (1.6.9-2) unstable; urgency=medium

  * Enable Linux namespace support.
  * Pass the full Debian version and package release date from d/changelog to
    the build system.
  * initscript: reorder the reload command arguments to always parse EXTRAOPTS
    properly.

 -- Apollon Oikonomopoulos <email address hidden>  Wed, 28 Sep 2016 10:45:43 +0300

Available diffs

Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.8-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + BUG/MAJOR: compression: initialize avail_in/next_in even during
      flush
    + BUG/MAJOR: server: the "sni" directive could randomly cause trouble
    + BUG/MAJOR: stick-counters: possible crash when using sc_trackers
      with wrong table

 -- Vincent Bernat <email address hidden>  Sun, 14 Aug 2016 14:17:08 +0200

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.7-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + BUG/MAJOR: fix use-after-free crash on start
    + BUG/MEDIUM: dns: fix alignment issues in the DNS response parser

 -- Vincent Bernat <email address hidden>  Thu, 14 Jul 2016 08:29:43 +0200

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.6-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + BUG/MAJOR: fix listening IP address storage for frontends
    + BUG/MAJOR: http: fix breakage of "reqdeny" causing random crashes
    + BUG/MEDIUM: stick-tables: fix breakage in table converters
    + BUG/MEDIUM: dns: unbreak DNS resolver after header fix
    + BUG/MEDIUM: stats: show servers state may show an servers from another
      backend
    + BUG/MEDIUM: fix risk of segfault with "show tls-keys"
    + BUG/MEDIUM: sticktables: segfault in some configuration error cases
    + BUG/MEDIUM: lua: converters doesn't work
    + BUG/MEDIUM: http: add-header: buffer overwritten
    + BUG/MEDIUM: external-checks: close all FDs right after the fork()
    + BUG/MAJOR: external-checks: use asynchronous signal delivery
  * Drop haproxy.service-check-config-before-reload.patch. Applied
    upstream.

 -- Vincent Bernat <email address hidden>  Tue, 28 Jun 2016 10:13:33 +0200

Available diffs

Superseded in xenial-updates
Superseded in xenial-security
haproxy (1.6.3-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: denial of service via reqdeny
    - debian/patches/CVE-2016-5360.patch: use temporary variable to store
      status in include/types/proto_http.h, src/proto_http.c.
    - CVE-2016-5360

 -- Marc Deslauriers <email address hidden>  Tue, 14 Jun 2016 09:35:08 +0300
Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.5-2) unstable; urgency=high

  * Add a patch to fix CVE-2016-5360. Closes: #826869.
    + BUG/MAJOR: http: fix breakage of "reqdeny" causing random crashes

 -- Vincent Bernat <email address hidden>  Sat, 11 Jun 2016 22:23:50 +0200

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.5-1) unstable; urgency=medium

  * New upstream release (see CHANGELOG):
    + BUG/MAJOR: channel: fix miscalculation of available buffer space
    + BUG/MAJOR: Fix crash in http_get_fhdr with exactly MAX_HDR_HISTORY
      headers
    + BUG/MEDIUM: channel: don't allow to overwrite the reserve until
      connected
    + BUG/MEDIUM: channel: fix inconsistent handling of 4GB-1 transfers
    + BUG/MEDIUM: channel: incorrect polling condition may delay event
      delivery
    + BUG/MEDIUM: dns: fix alignment issue when building DNS queries
    + BUG/MEDIUM: fix maxaccept computation on per-process listeners
    + BUG/MEDIUM: Fix RFC5077 resumption when more than TLS_TICKETS_NO are
      present
    + BUG/MEDIUM: http: fix risk of CPU spikes with pipelined requests from
      dead client
    + BUG/MEDIUM: log: fix risk of segfault when logging HTTP fields in TCP
      mode
    + BUG/MEDIUM: lua: protects the upper boundary of the argument list for
      converters/fetches.
    + BUG/MEDIUM: peers: fix incorrect age in frequency counters
    + BUG/MEDIUM: sample: initialize the pointer before parse_binary call.
    + BUG/MEDIUM: stats: show backend may show an empty or incomplete result
    + BUG/MEDIUM: stats: show servers state may show an empty or incomplete
      result
    + BUG/MEDIUM: stick-tables: some sample-fetch doesn't work in the
      connection state.
    + BUG/MEDIUM: stream: ensure the SI_FL_DONT_WAKE flag is properly cleared
    + BUG/MEDIUM: trace.c: rdtsc() is defined in two files
    + MEDIUM: unblock signals on startup.
  * Bump standards to 3.9.8; no changes needed.

 -- Apollon Oikonomopoulos <email address hidden>  Wed, 11 May 2016 11:07:24 +0300

Available diffs

Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
haproxy (1.6.4-3) unstable; urgency=medium

  * d/init: remove support for dynamic script name. This enable haproxy to
    be started on boot.

 -- Vincent Bernat <email address hidden>  Thu, 24 Mar 2016 20:36:08 +0100

Available diffs

Published in trusty-backports
haproxy (1.5.14-1ubuntu0.15.10.1~ubuntu14.04.1) trusty-backports; urgency=medium

  * No-change backport to trusty (LP: #1494141)

Superseded in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
haproxy (1.6.3-1) unstable; urgency=medium

  [ Apollon Oikonomopoulos ]
  * haproxy.init: use s-s-d's --pidfile option.
    Thanks to Louis Bouchard (Closes: 804530)

  [ Vincent Bernat ]
  * watch: fix d/watch to look for 1.6 version
  * Imported Upstream version 1.6.3

 -- Vincent Bernat <email address hidden>  Thu, 31 Dec 2015 08:10:10 +0100
Published in trusty-updates
Deleted in trusty-proposed (Reason: moved to -updates)
haproxy (1.4.24-2ubuntu0.4) trusty; urgency=medium

  * debian/haproxy.init: Ensure that EXIT trap does not override the
    return status of the init script, which causes issues in tools that
    check return codes such as pacemaker (LP: #1526271).

 -- James Page <email address hidden>  Tue, 15 Dec 2015 15:07:13 +0000
76150 of 206 results