UbuntuUpdates.org

Package "haproxy"

Name: haproxy

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • fast and reliable load balancing reverse proxy (HTML documentation)
  • syntax highlighting for HAProxy configuration files

Latest version: 1.8.8-1ubuntu0.13
Release: bionic (18.04)
Level: updates
Repository: universe

Links



Other versions of "haproxy" in Bionic

Repository Area Version
base main 1.8.8-1
base universe 1.8.8-1
security main 1.8.8-1ubuntu0.13
security universe 1.8.8-1ubuntu0.13
updates main 1.8.8-1ubuntu0.13

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.8.8-1ubuntu0.13 2023-02-14 20:07:11 UTC

  haproxy (1.8.8-1ubuntu0.13) bionic-security; urgency=medium

  * SECURITY UPDATE: incorrect handling of empty http header field names
    - debian/patches/CVE-2023-25725.patch: properly reject empty http
      header field names in src/h1.c, src/hpack-dec.c,
      include/common/hpack-tbl.h.
    - CVE-2023-25725

 -- Marc Deslauriers <email address hidden> Mon, 13 Feb 2023 07:59:11 -0500

Source diff to previous version

Version: 1.8.8-1ubuntu0.11 2020-07-13 17:06:51 UTC

  haproxy (1.8.8-1ubuntu0.11) bionic; urgency=medium

  * Avoid crashes on idle connections between http requests (LP: #1884149)

 -- Christian Ehrhardt <email address hidden> Mon, 22 Jun 2020 10:41:43 +0200

Source diff to previous version
1884149 haproxy crashes on in __pool_get_first if unique-id-header is used

Version: 1.8.8-1ubuntu0.10 2020-04-07 14:07:14 UTC

  haproxy (1.8.8-1ubuntu0.10) bionic-security; urgency=medium

  * SECURITY UPDATE: Arbitrary memory write
    - debian/patches/CVE-2020-11100.patch: make sure the headroom is
      considered only when the buffer does not wrap in src/hpack-tbl.c.
    - CVE-2020-11100

 -- <email address hidden> (Leonidas S. Barbosa) Fri, 03 Apr 2020 16:33:07 -0300

Source diff to previous version
CVE-2020-11100 In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a

Version: 1.8.8-1ubuntu0.9 2019-12-05 01:07:27 UTC

  haproxy (1.8.8-1ubuntu0.9) bionic-security; urgency=medium

  * SECURITY UPDATE: Intermediary Encapsulation attacks
    - debian/patches/CVE-2019-19330-*.patch: reject header values containing
      invalid chars and make header field name filtering stronger in
      src/h2.c, include/common/ist.h, include/common/h2.h.
    - CVE-2019-19330

 -- <email address hidden> (Leonidas S. Barbosa) Mon, 02 Dec 2019 12:38:31 -0300

Source diff to previous version
CVE-2019-19330 The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa),

Version: 1.8.8-1ubuntu0.8 2019-12-02 12:07:24 UTC

  haproxy (1.8.8-1ubuntu0.8) bionic; urgency=medium

  * d/p/lp-1848902-MINOR-systemd-consider-exit-status-143-as-successful.patch:
    fix potential hang in haproxy (LP: #1848902)

 -- Christian Ehrhardt <email address hidden> Tue, 12 Nov 2019 13:16:22 +0100

1848902 haproxy in bionic can get stuck



About   -   Send Feedback to @ubuntu_updates