HAProxy known bugs for maintenance branch 3.0 :  13 

This is maintenance branch 3.0 whose latest version is 3.0.11. If your version is not the last one in the maintenance branch, you are missing fixes for known bugs, and by not updating you are needlessly taking the responsibility for the risk of unexpected service outages and exposing your web site to possible security issues.

The HAProxy development team takes a great care of maintaining stable versions so that all users can apply bug fixes without having to take the risk of upgrading to a new branch. In turn users are expected to apply the fixes when the development team estimates that they were worth being backported to stable branches. In short, if you are running any 3.0 version other than 3.0.11, you're running with known bugs.

Quick links

Versions available in this branch

This branch contains the following releases :

DateVersionComment
2025-06-023.0.11 ⇐ last
2025-04-223.0.10 
2025-03-203.0.9 
2025-01-293.0.8 
2024-12-123.0.7 
2024-11-073.0.6 
2024-09-193.0.5 
2024-09-033.0.4 
2024-07-113.0.3 
2024-06-143.0.2 
2024-06-103.0.1 
2024-05-293.0.0 

Fixes for known bugs pending in this branch since the last release (3.0.11)

These fixes have already been queued for the next 3.0 release but no version was released with them yet. Note that fixes are backported several at a time from the development branch to maintenance branches, and the absence of a fix here doesn't mean none will be issued soon.

Bugs are almost always tagged with a severity (some people forget the severity tag when the bug is minor). The following severities are used :

Total known bugs in the latest version of this branch by category :

TotalCRITICALMAJORMEDIUMMINOR
13 0 0 7 6

Click on the subjects below to get the full description of the bug :

Merge dateSubject - Severity (minor, medium, major, critical)
2025-08-05BUG/MEDIUM: hlua_fcn: ensure systematic watcher cleanup for server list iterator
2025-08-05BUG/MINOR: hlua_fcn: restore server pairs iterator pointer consistency
2025-07-22BUG/MEDIUM: ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers
2025-06-17BUG/MEDIUM: check: Set SOCKERR by default when a connection error is reported
2025-06-17BUG/MEDIUM: cli: Don't consume data if outbuf is full or not available
2025-06-17BUG/MINOR: config/server: reject QUIC addresses
2025-06-17BUG/MINIR: h1: Fix doc of 'accept-unsafe-...-request' about URI parsing
2025-06-17BUG/MEDIUM: fd: Use the provided tgid in fd_insert() to get tgroup_info
2025-06-17BUG/MINOR: quic: Missing SSL session object freeing
2025-06-17BUG/MEDIUM: check: Requeue healthchecks on I/O events to handle check timeout
2025-06-02BUG/MINOR: quic: ensure cwnd limits are always enforced
2025-06-02BUG/MINOR: mux-quic: do not decode if conn in error
2025-06-02BUG/MEDIUM: peers: also limit the number of incoming updates

Known bugs fixed in the development branch after the last commit in this branch

It is important to understand that not all of these commits are necessarily relevant to this version, but clicking on them will show the bug description. All fixes are made first in the development branch and then backported to the maintenance branches. This ensures no fix is lost when upgrading. If a fix was marked for backporting to this branch and is not there yet, it's likely that it is still missing. Do not hesitate to ask on the haproxy mailing list if you feel like a fix has been skipped.

DateSubject
2025-09-15BUG/MINOR: ocsp: Crash when updating CA during ocsp updates
2025-09-15BUG/MEDIUM: http_ana: fix potential NULL deref in http_process_req_common()
2025-09-15Revert "BUG/MINOR: ocsp: Crash when updating CA during ocsp updates"
2025-09-15BUG/MINOR: ocsp: Crash when updating CA during ocsp updates
2025-09-15BUG/MEDIUM: resolvers: Wake resolver task up whne unlinking a stream requester
2025-09-12BUG/MEDIUM: resolvers: Accept to create resolution without hostname
2025-09-12BUG/MEDIUM: resolvers: Make resolution owns its hostname_dn value
2025-09-12BUG/MEDIUM: resolvers: Test for empty tree when getting a record from DNS answer
2025-09-11BUG/MINOR: resolvers: Restore round-robin selection on records in DNS answers
2025-09-11BUG/MEDIUM: resolvers: Properly cache do-resolv resolution
2025-09-11BUG/MINOR: ocsp: prototype inconsistency
2025-09-11BUG/MINOR: ssl: Fix potential NULL deref in trace callback
2025-09-11BUG/MINOR: ssl: Potential NULL deref in trace macro
2025-09-11BUG/MEDIUM: jws: return size_t in JWS functions
2025-09-11BUG/MINOR: acme: null pointer dereference upon allocation failure
2025-09-11BUG/MAJOR: stream: Force channel analysis on successful synchronous send
2025-09-10BUG/MINOR: stick-table: make sure never to miss a process_table_expire update
2025-09-10BUG/MEDIUM: ssl: Fix a crash if we failed to create the mux
2025-09-10BUG/MEDIUM: ssl: Fix a crash when using QUIC
2025-09-10DEBUG: stick-tables: export stktable_add_pend_updates() for better reporting
2025-09-10BUG/MEDIUM: stick-tables: don't loop on non-expirable entries
2025-09-10BUG/MINOR: activity: fix reporting of task latency

Back to the list of branches and versions
Back to the HAProxy page