HAProxy known bugs for maintenance branch 2.2 :  21 

This is maintenance branch 2.2 whose latest version is 2.2.33. If your version is not the last one in the maintenance branch, you are missing fixes for known bugs, and by not updating you are needlessly taking the responsibility for the risk of unexpected service outages and exposing your web site to possible security issues.

The HAProxy development team takes a great care of maintaining stable versions so that all users can apply bug fixes without having to take the risk of upgrading to a new branch. In turn users are expected to apply the fixes when the development team estimates that they were worth being backported to stable branches. In short, if you are running any 2.2 version other than 2.2.33, you're running with known bugs.

Quick links

Versions available in this branch

This branch contains the following releases :

2024-04-052.2.33 ⇐ last

Fixes for known bugs pending in this branch since the last release (2.2.33)

These fixes have already been queued for the next 2.2 release but no version was released with them yet. Note that fixes are backported several at a time from the development branch to maintenance branches, and the absence of a fix here doesn't mean none will be issued soon.

Bugs are almost always tagged with a severity (some people forget the severity tag when the bug is minor). The following severities are used :

Total known bugs in the latest version of this branch by category :

21 0 0 8 13

Click on the subjects below to get the full description of the bug :

Merge dateSubject - Severity (minor, medium, major, critical)
2024-07-03BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct()
2024-07-03BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning
2024-07-03BUG/MINOR: haproxy: only tid 0 must not sleep if got signal
2024-07-03BUG/MEDIUM: http_ana: ignore NTLM for reuse aggressive/always and no H1
2024-07-03BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration
2024-07-03BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory
2024-07-03BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser
2024-07-03BUG/MINOR: ssl/ocsp: init callback func ptr as NULL
2024-07-03BUG/MINOR: stats: Don't state the 303 redirect response is chunked
2024-07-03BUG/MINOR: htpp-ana/stats: Specify that HTX redirect messages have a C-L header
2024-07-03BUG/MEDIUM: fd: prevent memory waste in fdtab array
2024-07-03BUG/MEDIUM: htx: mark htx_sl as packed since it may be realigned
2024-07-03BUG/MINOR: h1: fix detection of upper bytes in the URI
2024-07-03BUG/MINOR: fd: my_closefrom() on Linux could skip contiguous series of sockets
2024-07-03BUG/MEDIUM: evports: do not clear returned events list on signal
2024-07-03BUG/MEDIUM: stconn: Don't forward channel data if input data must be filtered
2024-07-03BUG/MEDIUM: http-ana: Deliver 502 on keep-alive for fressh server connection
2024-07-03BUG/MINOR: log: invalid snprintf() usage in sess_build_logline()
2024-07-03BUG/MINOR: tools/log: invalid encode_{chunk,string} usage
2024-07-03BUG/MINOR: log: fix lf_text_len() truncate inconsistency
2024-04-08BUG/MEDIUM: connection: report connection errors even when no mux is installed

Known bugs fixed in the development branch after the last commit in this branch

It is important to understand that not all of these commits are necessarily relevant to this version, but clicking on them will show the bug description. All fixes are made first in the development branch and then backported to the maintenance branches. This ensures no fix is lost when upgrading. If a fix was marked for backporting to this branch and is not there yet, it's likely that it is still missing. Do not hesitate to ask on the haproxy mailing list if you feel like a fix has been skipped.

2024-07-17BUG/MAJOR: mux-h2: force a hard error upon short read with pending error
2024-07-17BUG/MEDIUM: ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path
2024-07-16BUG/MEDIUM: debug/cli: fix "show threads" crashing with low thread counts
2024-07-16BUG/MINOR: do not close uninit FD in quic_test_socketops()
2024-07-12BUG/MINOR: session: Eval L4/L5 rules defined in the default section
2024-07-11BUG/MINOR: limits: fix license type in limits.h
2024-07-11BUG/MEDIUM: bwlim: Be sure to never set the analyze expiration date in past
2024-07-10BUG/MEDIUM: spoe: Be sure to create a SPOE applet if none on the current thread
2024-07-10BUG/MEDIUM: h1: Reject empty Transfer-encoding header
2024-07-10BUG/MINOR: h1: Reject empty coding name as last transfer-encoding value
2024-07-10BUG/MINOR: h1: Fail to parse empty transfer coding names
2024-07-08BUG/MINOR: jwt: fix variable initialisation
2024-07-08BUG/MEDIUM: init: fix fd_hard_limit default in compute_ideal_maxconn
2024-07-05BUG/MEDIUM: peers: Fix crash when syncing learn state of a peer without appctx
2024-07-04BUG/MEDIUM: quic: prevent crash on accept queue full
2024-07-03MINOR: quic: add 2 BUG_ON() on datagram dispatch
2024-07-03BUG/MINOR: jwt: don't try to load files with HMAC algorithm
2024-07-03BUG/MEDIUM: server: fix race on server_atomic_sync()

Back to the list of branches and versions
Back to the HAProxy page