On Wed, Apr 03, 2013 at 05:08:22PM +0700, Prach Pongpanich wrote:
> Hi,
> 
> CC:674...@bugs.debian.org
> 
> Thanks for your quick response.
> 
> > Why would you insist on patching a version as old as 1.4.15 ?
> For the next Debain stable release.
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674447

Great, so I'm assuming that debian now accepts to backport bugfixes into
stable releases. This is excellent news for end users, as they will finally
be able to use the haproxy package from the distro instead of rebuilding
their own from sources!

Then at least the following list of commits should be considered since 1.4.15
for the package to be reasonable usable in production :

haproxy-1.4$ git log --oneline v1.4.15..v1.4.23 |grep BUG |grep -v MINOR
dc80672 BUG/CRITICAL: using HTTP information in tcp-request content may crash 
the process
f409605 BUG/MAJOR: ev_select: disable the select() poller if maxsock > 
FD_SETSIZE
022ff7d BUG/MEDIUM: uri_auth: missing NULL check and memory leak on memory 
shortage
cf196ab BUG/MEDIUM: signal: signal handler does not properly check for signal 
bounds
9e98076 BUG/MEDIUM: checks: ensure the health_status is always within bounds
e35cc95 BUG/MEDIUM: remove supplementary groups when changing gid
3072270 BUG/MEDIUM: tcp: process could theorically crash on lack of source ports
475b5ec BUG/MAJOR: cli: show sess <id> may randomly corrupt the back-ref list
ce64f84 BUG/MEDIUM: command-line option -D must have precedence over "debug"
7a883f8 BUG/MEDIUM: http: set DONTWAIT on data when switching to tunnel mode
3a29a1b BUG/MEDIUM: ebtree: ebmb_insert() must not call cmp_bits on full-length 
matches
cf7617b BUG/MEDIUM: option forwardfor if-none doesn't work with some 
configurations
3cf5e41 BUG/MAJOR: checks: don't call set_server_status_* when no LB algo is set
30297cb BUG/MAJOR: trash must always be the size of a buffer
497d258 BUG/MEDIUM: balance source did not properly hash IPv6 addresses
bc26a52 BUG/MAJOR: possible crash when using capture headers on TCP frontends
95e9a2b BUG: http: disable TCP delayed ACKs when forwarding content-length data
9e78c99 BUG: queue: fix dequeueing sequence on HTTP keep-alive sessions
39030be BUG/MEDIUM: zero-weight servers must not dequeue requests from the 
backend
1a6b510 BUG/MEDIUM: correctly disable servers tracking another disabled servers.
6df28bc BUG: http: re-enable TCP quick-ack upon incomplete HTTP requests
3b1f837 BUG: ebtree: ebst_lookup() could return the wrong entry
445e0cd BUG: tcp: option nolinger does not work on backends
98c43b2 BUG/MEDIUM: checks: fix slowstart behaviour when server tracking is in 
use
ad3a1b0 BUG/MEDIUM: don't trim last spaces from headers consisting only of 
spaces
610538e [BUG] http: trailing white spaces must also be trimmed after headers
9ebe93d [BUG] check: http-check expect + regex would crash in defaults section

And the following ones could be added too :

5083307 BUG: http: tighten the list of allowed characters in a URI
5b4d077 BUG: fix garbage data when http-send-name-header replaces an existing 
header
bf9e1bd BUG: checks: fix server maintenance exit sequence
f50e75b BUG: proto_tcp: set AF_INET on tproxy for use with recent kernels
ef11c03 [BUG] checks: fix support of Mysqld >= 5.5 for mysql-check
74254aa [BUG] checks: http-check expect could fail a check on multi-packet 
responses

Hoping this helps !

Willy


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to