-
haproxy (2.2.3-2) experimental; urgency=medium
* d/patches: add upstream patch to fix build on ARM32
-- Vincent Bernat <email address hidden> Wed, 09 Sep 2020 19:38:52 +0200
-
haproxy (2.2.3-1) experimental; urgency=medium
* New upstream version.
- BUG/MAJOR: dns: disabled servers through SRV records never recover
-- Vincent Bernat <email address hidden> Tue, 08 Sep 2020 23:12:05 +0200
-
haproxy (2.2.2-1) experimental; urgency=medium
* New upstream version.
- BUG/MAJOR: dns: don't treat Authority records as an error
- BUG/MAJOR: dns: fix null pointer dereference in
snr_update_srv_status
-- Vincent Bernat <email address hidden> Sat, 01 Aug 2020 17:06:42 +0200
-
haproxy (2.0.17-1) unstable; urgency=medium
* New upstream release.
- BUG/MAJOR: dns: Make the do-resolve action thread-safe
-- Vincent Bernat <email address hidden> Sat, 01 Aug 2020 20:05:01 +0200
-
haproxy (2.0.16-1) unstable; urgency=medium
* New upstream release.
- BUG/MAJOR: stream: Mark the server address as unset on new outgoing
connection
* d/patches: refresh patches.
-- Vincent Bernat <email address hidden> Sat, 18 Jul 2020 13:50:56 +0200
-
haproxy (2.0.15-1) unstable; urgency=medium
* New upstream release.
- BUG/MAJOR: stream-int: always detach a faulty endpoint on connect
failure
-- Vincent Bernat <email address hidden> Sat, 13 Jun 2020 18:48:25 +0200
-
haproxy (2.0.14-1) unstable; urgency=medium
* New upstream release.
- BUG/CRITICAL: hpack: never index a header into the headroom after
wrapping
- BUG/MAJOR: http-ana: Always abort the request when a tarpit is
triggered
- BUG/MAJOR: list: fix invalid element address calculation
- BUG/MAJOR: proxy_protocol: Properly validate TLV lengths
* d/control: fix maintainer address. Closes: #955553.
-- Vincent Bernat <email address hidden> Thu, 16 Apr 2020 18:34:22 +0200
-
haproxy (2.0.13-2) unstable; urgency=medium
* d/dconv: replace cgi.escape by html.escape. Closes: #951416.
* d/copryight: document OpenSSL exception. Closes: #951782.
* d/haproxy.cfg: use "ssl-min-ver" to set minimum version.
* Apply one patch to fix an overflow in HTTP/2 header handling.
Fix CVE-2020-11100.
-- Vincent Bernat <email address hidden> Wed, 01 Apr 2020 21:49:32 +0200