From Salvatore Bonaccorso@21:1/5 to All on Fri Apr 11 21:10:01 2025
Source: haproxy
Version: 3.0.9-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 2.6.12-1+deb12u1
Control: found -1 2.6.12-1
Hi,
The following vulnerability was published for haproxy.
CVE-2025-32464[0]:
| HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a
| sample_conv_regsub heap-based buffer overflow because of mishandling
| of the replacement of multiple short patterns with a longer one.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
+2025/04/22 : 3.0.10
+ - MINOR: log: support "raw" logformat node typecast
+ - BUG/MINOR: peers: fix expire learned from a peer not converted from ms to ticks
+ - BUG/MEDIUM: peers: prevent learning expiration too far in futur from unsync node
+ - BUG/MEDIUM: mux-quic: fix crash on RS/SS emission if already close local + - BUG/MINOR: mux-quic: remove extra BUG_ON() in _qcc_send_stream()
+ - BUG/MINOR: log: fix gcc warn about truncating NUL terminator while init char arrays
+ - DOC: config: fix two missing "content" in "tcp-request" examples
+ - BUILD: compiler: undefine the CONCAT() macro if already defined
+ - BUG/MINOR: rhttp: fix incorrect dst/dst_port values
+ - BUG/MINOR: backend: do not overwrite srv dst address on reuse
+ - BUG/MEDIUM: backend: fix reuse with set-dst/set-dst-port
+