Package "haproxy"
WARNING: the "haproxy" package was deleted from this repository
| Name: |
haproxy
|
Description: |
fast and reliable load balancing reverse proxy
|
| Latest version: |
*DELETED* |
| Release: |
noble (24.04) |
| Level: |
proposed |
| Repository: |
main |
| Homepage: |
http://www.haproxy.org/ |
Links
Download "haproxy"
Other versions of "haproxy" in Noble
Changelog
|
haproxy (2.8.16-0ubuntu0.24.04.1) noble; urgency=medium
* New upstream version (LP: #2127664)
- The API for the lua HTTPMessage "class" was improved to be able to
change the body length. It was mandatory to be able to write a lua
filter altering the message payload. HTTPMessage:set_body_len() can now
be used for this purpose
- Still in lua, The HTTP client is not supposed to be used to process
several requests but there was nothing to prevent this usage. An error
is now triggered in that case
- For further information, see the upstream release notes:
+ https://<email address hidden>/msg46201.html
* d/p/CVE-2025-11230.patch: drop patch fixed upstream in 2.8.16
-- Athos Ribeiro <email address hidden> Wed, 03 Dec 2025 12:12:24 -0300
|
| 2127664 |
New HAProxy upstream microreleases 2.4.30, 2.8.16, and 3.0.12 |
| CVE-2025-11230 |
BUG/CRITICAL: mjson: fix possible DoS when parsing numbers |
|
|
haproxy (2.8.15-0ubuntu0.24.04.1) noble; urgency=medium
* New upstream version (LP: #2112526)
- This new release introduce several fixes, including bug fixes for QUIC,
for the SSL stack, and LUA.
- New configuration options were introduced, and a new default value for
the hard limit on the number of file descriptors was introduced. These
are described in the Debian NEWS file.
- For further information, see the upstream release notes:
+ https://<email address hidden>/msg44606.html
+ https://<email address hidden>/msg44632.html
+ https://<email address hidden>/msg44787.html
+ https://<email address hidden>/msg44790.html
+ https://<email address hidden>/msg45060.html
+ https://<email address hidden>/msg45317.html
+ https://<email address hidden>/msg45413.html
+ https://<email address hidden>/msg45486.html
+ https://<email address hidden>/msg45570.html
+ https://<email address hidden>/msg45806.html
* d/NEWS: add NEWS file.
* Dropped paches applied upstream:
- d/p/CVE-2024-53008-1.patch
- d/p/CVE-2024-53008-2.patch
- d/p/CVE-2025-32464.patch
-- Athos Ribeiro <email address hidden> Wed, 08 Oct 2025 10:50:30 -0300
|
| 2112526 |
Micro release updates for jammy, noble, and plucky |
| CVE-2024-53008 |
Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remo |
| CVE-2025-32464 |
HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the repl |
|
About
-
Send Feedback to @ubuntu_updates