HAProxy known bugs for maintenance branch 2.8 :  73 

This is maintenance branch 2.8 whose latest version is 2.8.15. If your version is not the last one in the maintenance branch, you are missing fixes for known bugs, and by not updating you are needlessly taking the responsibility for the risk of unexpected service outages and exposing your web site to possible security issues.

The HAProxy development team takes a great care of maintaining stable versions so that all users can apply bug fixes without having to take the risk of upgrading to a new branch. In turn users are expected to apply the fixes when the development team estimates that they were worth being backported to stable branches. In short, if you are running any 2.8 version other than 2.8.15, you're running with known bugs.

Quick links

Versions available in this branch

This branch contains the following releases :

DateVersionComment
2025-04-222.8.15 ⇐ last
2025-01-292.8.14 
2024-12-122.8.13 
2024-11-082.8.12 
2024-09-192.8.11 
2024-06-142.8.10 
2024-04-052.8.9 
2024-04-052.8.8 
2024-02-262.8.7 
2024-02-152.8.6 
2023-12-072.8.5 
2023-11-172.8.4 
2023-09-072.8.3 
2023-08-092.8.2 
2023-07-032.8.1 
2023-05-312.8.0 

Fixes for known bugs pending in this branch since the last release (2.8.15)

These fixes have already been queued for the next 2.8 release but no version was released with them yet. Note that fixes are backported several at a time from the development branch to maintenance branches, and the absence of a fix here doesn't mean none will be issued soon.

Bugs are almost always tagged with a severity (some people forget the severity tag when the bug is minor). The following severities are used :

Total known bugs in the latest version of this branch by category :

TotalCRITICALMAJORMEDIUMMINOR
73 0 1 26 46

Click on the subjects below to get the full description of the bug :

Merge dateSubject - Severity (minor, medium, major, critical)
2025-10-01Revert "BUG/MINOR: config/server: reject QUIC addresses"
2025-10-01BUG/MINOR: h3: Fix errors introduced because of failed backport
2025-10-01BUG/MEDIUM: ssl: ca-file directory mode must read every certificates of a file
2025-10-01BUG/MINOR: server: Update healthcheck when server settings are changed via CLI
2025-10-01BUG/MINOR: resolvers: always normalize FQDN from response
2025-10-01BUG/MINOR: ocsp: Crash when updating CA during ocsp updates
2025-10-01BUG/MINOR: activity: fix reporting of task latency
2025-10-01BUG/MEDIUM: ssl: create the mux immediately on early data
2025-10-01BUG/MEDIUM: h1: Allow reception if we have early data
2025-10-01BUG/MEDIUM: checks: fix ALPN inheritance from server
2025-10-01BUG/MINOR: haproxy: be sure not to quit too early on soft stop
2025-10-01BUG/MINOR: quic: fix room check if padding requested
2025-10-01BUG/MEDIUM: server: Duplicate healthcheck's alpn inherited from default server
2025-10-01BUG/MINOR: acl: set arg_list->kw to aclkw->kw string literal if aclkw is found
2025-10-01BUG/MINOR: quic: do not emit probe data if CONNECTION_CLOSE requested
2025-10-01BUG/MINOR: mux-h1: fix wrong lock label
2025-10-01BUG/MEDIUM: http-client: Test HTX_FL_EOM flag before commiting the HTX buffer
2025-10-01BUG/MINOR: init: Initialize random seed earlier in the init process
2025-10-01BUG/MEDIUM: ssl: fix build with AWS-LC
2025-10-01BUG/MEDIUM: ssl: Fix 0rtt to the server
2025-10-01BUG/MINOR: stick-table: cap sticky counter idx with tune.nb_stk_ctr instead of MAX_SESS_STKCTR
2025-10-01BUG/MEDIUM: threads: Disable the workaround to load libgcc_s on macOS
2025-10-01BUG/MINOR: halog: exit with error when some output filters are set simultaneosly
2025-10-01BUG/MINOR: applet: Don't trigger BUG_ON if the tid is not on appctx init
2025-10-01BUG/MEDIUM: http-client: Notify applet has more data to deliver until the EOM
2025-10-01BUG/MEDIUM: http-client: Drain the request if an early response is received
2025-10-01BUG/MINOR: http-client: Reject any 101-switching-protocols response
2025-10-01BUG/MINOR: http-client: Ignore 1XX interim responses in non-HTX mode
2025-10-01BUG/MEDIUM: http-client: Ask for more room when request data cannot be xferred
2025-10-01BUG/MEDIUM: http-client: Properly inc input data when HTX blocks are xferred
2025-10-01BUG/MEDIUM: http-client: Don't wake http-client applet if nothing was xferred
2025-10-01BUG/MINOR: listener: really assign distinct IDs to shards
2025-10-01BUG/MINOR: hlua: take default-path into account with lua-load-per-thread
2025-10-01BUG/MEDIUM: dns: Reset reconnect tempo when connection is finally established
2025-10-01BUG/MEDIUM: hlua: Report to SC when output data are blocked on a lua socket
2025-10-01BUG/MEDIUM: hlua: Report to SC when data were consumed on a lua socket
2025-10-01BUG/MINOR: hlua: Skip headers when a receive is performed on an HTTP applet
2025-10-01BUG/MINOR: jwt: Copy input and parameters in dedicated buffers in jwt_verify converter
2025-10-01BUG/MEDIUM: mux-h2: Properly handle connection error during preface sending
2025-10-01BUG/MEDIUM: hlua: Forbid any L6/L7 sample fetche functions from lua services
2025-10-01BUG/MINOR: quic: wrong QUIC_FT_CONNECTION_CLOSE(0x1c) frame encoding
2025-10-01BUG/MINOR: log: Be able to use %ID alias at anytime of the stream's evaluation
2025-10-01BUG/MINOR: stream: Avoid recursive evaluation for unique-id based on itself
2025-10-01BUG/MEDIUM: h1/h2/h3: reject forbidden chars in the Host header field
2025-10-01BUG/MEDIUM: h2/h3: reject some forbidden chars in :authority before reassembly
2025-10-01BUG/MEDIUM: ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers
2025-10-01BUG/MEDIUM: check: Set SOCKERR by default when a connection error is reported
2025-10-01BUG/MINOR: config/server: reject QUIC addresses
2025-10-01BUG/MEDIUM: fd: Use the provided tgid in fd_insert() to get tgroup_info
2025-10-01BUG/MEDIUM: check: Requeue healthchecks on I/O events to handle check timeout
2025-10-01BUG/MINOR: mux-quic: do not decode if conn in error
2025-10-01BUG/MEDIUM: httpclient: Throw an error if an lua httpclient instance is reused
2025-06-18BUG/MINOR: init: relax LSTCHK_NETADM checks for non root
2025-05-28BUG/MINOR: limits: compute_ideal_maxconn: don't cap remain if fd_hard_limit=0
2025-05-27BUG/MINOR: h3: Set HTX flags corresponding to the scheme found in the request
2025-05-27BUG/MINOR: mux-h2: Reset streams with NO_ERROR code if full response was already sent
2025-05-27BUG/MINOR: h3: don't insert more than one Host header
2025-05-27BUG/MINOR: sink: detect and warn when using "send-proxy" options with ring servers
2025-05-27BUG/MINOR: hlua: Fix Channel:data() and Channel:line() to respect documentation
2025-05-27BUG/MINOR: threads: fix soft-stop without multithreading support
2025-05-27BUG/MINOR: cli: fix too many args detection for commands
2025-05-27BUG/MINOR: quic: reject invalid max_udp_payload size
2025-05-27BUG/MINOR: quic: fix TP reject on invalid max-ack-delay
2025-05-27BUG/MINOR: quic: use proper error code on invalid received TP value
2025-05-27BUG/MINOR: quic: reject retry_source_cid TP on server side
2025-05-27BUG/MINOR: quic: use proper error code on invalid server TP
2025-05-27BUG/MINOR: quic: use proper error code on missing CID in TPs
2025-05-27BUG/MINOR: proxy: only use proxy_inc_fe_cum_sess_ver_ctr() with frontends
2025-05-27BUG/MINOR: mux-h1: Fix trace message in h1_detroy() to not relay on connection
2025-05-27BUG/MINOR: mux-h1: Don't pretend connection was released for TCP>H1>H2 upgrade
2025-05-27BUG/MINOR: dns: prevent ds accumulation within dss
2025-05-27BUG/MINOR: dns: add tempo between 2 connection attempts for dns servers
2025-05-27BUG/MAJOR: listeners: transfer connection accounting when switching listeners
2025-05-27BUG/MINOR: cli: Issue an error when too many args are passed for a command

Known bugs fixed in the development branch after the last commit in this branch

It is important to understand that not all of these commits are necessarily relevant to this version, but clicking on them will show the bug description. All fixes are made first in the development branch and then backported to the maintenance branches. This ensures no fix is lost when upgrading. If a fix was marked for backporting to this branch and is not there yet, it's likely that it is still missing. Do not hesitate to ask on the haproxy mailing list if you feel like a fix has been skipped.

DateSubject

Back to the list of branches and versions
Back to the HAProxy page