~ahasenack/ubuntu/+source/haproxy:disco-haproxy-1.8.19

Last commit made on 2019-02-20
Get this branch:
git clone -b disco-haproxy-1.8.19 https://git.launchpad.net/~ahasenack/ubuntu/+source/haproxy
Only Andreas Hasenack can upload to this branch. If you are Andreas Hasenack please log in for upload directions.

Branch merges

Branch information

Name:
disco-haproxy-1.8.19
Repository:
lp:~ahasenack/ubuntu/+source/haproxy

Recent commits

9132c04... by Andreas Hasenack

update-maintainer

1044ad9... by Andreas Hasenack

reconstruct-changelog

ebda99b... by Andreas Hasenack

merge-changelogs

e44336d... by Andreas Hasenack

    - d/t/control, d/t/proxy-localhost: simple DEP8 test to actually
      generate traffic through haproxy.
      [Updated to use "service" instead of "systemctl" to match what was
      submitted to Debian.]

bd3810b... by Apollon Oikonomopoulos <email address hidden>

Import patches-unapplied version 1.8.19-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 3b885bfb277d04831405e979d38eac423793855c

New changelog entries:
  * New upstream version 1.8.19
    - BUG/MEDIUM: spoe: initialization depending on nbthread must be done last
    - BUG/MEDIUM: server: initialize the idle conns list after parsing the
                  config
    - BUG/MAJOR: spoe: Don't try to get agent config during SPOP healthcheck
    - BUG/MAJOR: stream: avoid double free on unique_id (Closes: #921981)

3b885bf... by Vincent Bernat

Import patches-unapplied version 1.8.18-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a1a84313d54570921ed9a0ecd52c2b23ec5e991e

New changelog entries:
  * New upstream version 1.8.18
    - BUG/MAJOR: cache: fix confusion between zero and uninitialized cache
                 key
    - BUG/MAJOR: config: verify that targets of track-sc and stick rules
                 are present
    - BUG/MAJOR: spoe: verify that backends used by SPOE cover all their
                 callers' processes

a1a8431... by Apollon Oikonomopoulos <email address hidden>

Import patches-unapplied version 1.8.17-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 03841ec1abca416beae02d073a361299c32e4418

New changelog entries:
  * New upstream version 1.8.17
    - BUG/MAJOR: stream-int: Update the stream expiration date in
      stream_int_notify()
    - BUG/MEDIUM: mux-h2: mark that we have too many CS once we have more than
      the max
    - BUG/MEDIUM: server: Also copy "check-sni" for server templates.
    - BUG/MEDIUM: cli: make "show sess" really thread-safe
    - BUG/MEDIUM: lua: dead lock when Lua tasks are trigerred
  * Drop CVE-2018-20615.patch; merged upstream

03841ec... by Apollon Oikonomopoulos <email address hidden>

Import patches-unapplied version 1.8.16-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 987eb4465096f4b26df6c0c7b7ea32e7e6664147

New changelog entries:
  * Fix out-of-bounds read in HTTP2 mux (CVE-2018-20615).
    This would possibly lead to a crash in H2 HEADERS frame decoder when the
    PRIORITY flag is present, due to a missing frame size check.
  * Bump Standards-Version to 4.3.0; no changes needed.

987eb44... by Vincent Bernat

Import patches-unapplied version 1.8.16-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 30cfa33d534fba4654046868cfd4c193d9a52078

New changelog entries:
  * New upstream version 1.8.16.
    - BUG/MEDIUM: dns: Don't prevent reading the last byte of the payload
      in dns_validate_response()
    - BUG/MEDIUM: dns: overflowed dns name start position causing invalid
      dns error
  * d/rules: do not override CFLAGS, hijack DEBUG_CFLAGS for this instead.

30cfa33... by Apollon Oikonomopoulos <email address hidden>

Import patches-unapplied version 1.8.15-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6a4ce6b0331d661a0607ddad1d4af1d46aa9bcc0

New changelog entries:
  [ Vincent Bernat ]
  * d/rules: switch to pcre2. Closes: #911933.
  [ Apollon Oikonomopoulos ]
  * New upstream version 1.8.15
    - BUG: dns: Fix off-by-one write in dns_validate_dns_response() (
    - BUG: dns: Fix out-of-bounds read via signedness error in
      dns_validate_dns_response()
    - BUG: dns: Prevent out-of-bounds read in dns_read_name()
    - BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
      (CVE-2018-20102, closes: #916308)
    - BUG: dns: Prevent stack-exhaustion via recursion loop in dns_read_name
      (CVE-2018-20103, closes: #916307)
    - BUG/MAJOR: http: http_txn_get_path() may deference an inexisting buffer