Package "haproxy"
WARNING: the "haproxy" package was deleted from this repository
Name: |
haproxy
|
Description: |
fast and reliable load balancing reverse proxy
|
Latest version: |
*DELETED* |
Release: |
jammy (22.04) |
Level: |
proposed |
Repository: |
main |
Homepage: |
http://www.haproxy.org/ |
Links
Download "haproxy"
Other versions of "haproxy" in Jammy
Changelog
No changelog for deleted or moved packages.
|
haproxy (2.4.24-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream release (LP: #2028418)
- Major and critical bug fixes according to the upstream changelog:
+ BUG/MAJOR: http-ana: Get a fresh trash buffer for each header value
replacement
+ BUG/MAJOR: http: reject any empty content-length header value
- For further information, refer to the upstream changelog at
https://www.haproxy.org/download/2.4/src/CHANGELOG and to the upstream
release announcements at
https://<email address hidden>/msg43664.html
(2.4.23), and
https://<email address hidden>/msg43901.html (2.4.24)
- Remove patches applied by upstream in debian/patches:
+ CVE-2023-40225-1.patch
+ CVE-2023-40225-2.patch
-- Athos Ribeiro <email address hidden> Tue, 31 Oct 2023 11:16:29 -0300
|
2028418 |
MRE updates of haproxy for focal, jammy and lunar |
CVE-2023-40225 |
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x |
|
No changelog for deleted or moved packages.
|
haproxy (2.4.22-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream release (LP: #2012557).
- Major and critical bug fixes according to the upstream changelog:
+ BUG/MAJOR: log-forward: Fix log-forward proxies not fully initialized
+ BUG/MAJOR: mworker: fix infinite loop on master with no proxies.
+ BUG/MAJOR: stick-tables: do not try to index a server name for applets
+ BUG/MAJOR: stick-table: don't process store-response rules for applets
+ BUG/MAJOR: fcgi: Fix uninitialized reserved bytes
+ BUG/MAJOR: buf: Fix copy of wrapping output data when a buffer is realigned
+ BUG/CRITICAL: http: properly reject empty http header field names
- Remove patches applied by upstream in debian/patches:
+ CVE-2023-0056.patch
+ CVE-2023-25725.patch
+ CVE-2023-0836.patch
- Refresh existing patches in debian/patches:
+ haproxy.service-start-after-syslog.patch
+ reproducible.patch
* Backport DEP-8 tests from Lunar:
- d/t/proxy-ssl-termination
- d/t/proxy-ssl-pass-through
-- Lucas Kanashiro <email address hidden> Wed, 22 Mar 2023 18:18:54 -0300
|
2012557 |
[MRE] haproxy |
CVE-2023-0056 |
RESERVED |
CVE-2023-25725 |
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." |
CVE-2023-0836 |
An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 |
|
No changelog for deleted or moved packages.
|
About
-
Send Feedback to @ubuntu_updates