[ubuntu/noble-proposed] haproxy 2.8.16-0ubuntu0.24.04.1 (Accepted)

Athos Ribeiro athos at ubuntu.com
Thu Jan 8 20:10:44 UTC 2026


haproxy (2.8.16-0ubuntu0.24.04.1) noble; urgency=medium

  * New upstream version (LP: #2127664)
    - The API for the lua HTTPMessage "class" was improved to be able to
      change the body length. It was mandatory to be able to write a lua
      filter altering the message payload. HTTPMessage:set_body_len() can now
      be used for this purpose
    - Still in lua, The HTTP client is not supposed to be used to process
      several requests but there was nothing to prevent this usage. An error
      is now triggered in that case
    - For further information, see the upstream release notes:
      + https://www.mail-archive.com/haproxy@formilux.org/msg46201.html
  * d/p/CVE-2025-11230.patch: drop patch fixed upstream in 2.8.16

Date: Wed, 03 Dec 2025 12:12:24 -0300
Changed-By: Athos Ribeiro <athos at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Athos Ribeiro <athos.ribeiro at canonical.com>
https://launchpad.net/ubuntu/+source/haproxy/2.8.16-0ubuntu0.24.04.1
-------------- next part --------------
Format: 1.8
Date: Wed, 03 Dec 2025 12:12:24 -0300
Source: haproxy
Built-For-Profiles: noudeb
Architecture: source
Version: 2.8.16-0ubuntu0.24.04.1
Distribution: noble
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Athos Ribeiro <athos at ubuntu.com>
Launchpad-Bugs-Fixed: 2127664
Changes:
 haproxy (2.8.16-0ubuntu0.24.04.1) noble; urgency=medium
 .
   * New upstream version (LP: #2127664)
     - The API for the lua HTTPMessage "class" was improved to be able to
       change the body length. It was mandatory to be able to write a lua
       filter altering the message payload. HTTPMessage:set_body_len() can now
       be used for this purpose
     - Still in lua, The HTTP client is not supposed to be used to process
       several requests but there was nothing to prevent this usage. An error
       is now triggered in that case
     - For further information, see the upstream release notes:
       + https://www.mail-archive.com/haproxy@formilux.org/msg46201.html
   * d/p/CVE-2025-11230.patch: drop patch fixed upstream in 2.8.16
Checksums-Sha1:
 636a219bb9a7ad86479545f6e34d1ee4b324dd12 2476 haproxy_2.8.16-0ubuntu0.24.04.1.dsc
 c5e69a951fa724ee23d8aed69a7e82398c2134b0 4429238 haproxy_2.8.16.orig.tar.gz
 1f2242dbbafdac8d6b7dd4bb3ef5eb284fc10597 77376 haproxy_2.8.16-0ubuntu0.24.04.1.debian.tar.xz
 e25f311f55f3946f09f648a3fdab181165020cc8 8593 haproxy_2.8.16-0ubuntu0.24.04.1_source.buildinfo
Checksums-Sha256:
 939f0d6337444867cd9a779b0479d5b6b4bf268879f795420bddcc786b43e939 2476 haproxy_2.8.16-0ubuntu0.24.04.1.dsc
 6eb4d3cc298af89613fc6cb175530436e1e463d368e43401a60357a7a12d15ab 4429238 haproxy_2.8.16.orig.tar.gz
 1a9cf9cf1e0a83fc2efd9611d54728e80e61c12b767ddcf06dd38f45ce1a00d7 77376 haproxy_2.8.16-0ubuntu0.24.04.1.debian.tar.xz
 596c50fd5701df936187fa0caa62d540059e730dca21197a62153e8365801a46 8593 haproxy_2.8.16-0ubuntu0.24.04.1_source.buildinfo
Files:
 319f38e4521eae271cc532c9ead1ed76 2476 net optional haproxy_2.8.16-0ubuntu0.24.04.1.dsc
 97109db1758b0220f2fd588658c70963 4429238 net optional haproxy_2.8.16.orig.tar.gz
 5e25b114a2655357501095e82a48111b 77376 net optional haproxy_2.8.16-0ubuntu0.24.04.1.debian.tar.xz
 3100bf7c1447be97c00df39d6441caf7 8593 net optional haproxy_2.8.16-0ubuntu0.24.04.1_source.buildinfo
Original-Maintainer: Debian HAProxy Maintainers <team+haproxy at tracker.debian.org>
Vcs-Git: https://git.launchpad.net/~athos/ubuntu/+source/haproxy
Vcs-Git-Commit: 90358579465833f26931c887f894fedd1ddf1422
Vcs-Git-Ref: refs/heads/MRE-noble-2.8.16


More information about the noble-changes mailing list