Hi, HAProxy 2.6.24 was released on 2026/03/09. It added 19 new commits after version 2.6.23.
- H2/HPACK: the varint decoder would accept integers larger than 32-bit but would keep the value as valid, though the spec mandates that an error should be reported in this case. The only effect would be that haproxy could decode a stream of bytes that an observer on the wire (e.g. wireshark) could fail to parse. It will now properly return an error. - H2: some pending errors were not immediately reported to the stream if they happened before the stream was instantiated, resulting in the stream being created and waiting for a timeout before failing. - H3/QPACK: a crash can be caused by an out-of-bounds read if a malformed HPACK instruction is passed to the huffman decoder. A CVE was requested for this one. The same issue with varints as with the HPACK decoder above was also addressed (except that it's 64-bit in QPACK). - H1: while the request was properly tested, a test was missing on the response to ensure that the version starts with "HTTP/". There's normally no impact on this since users who could rely on such a thing are expected to already use "accept-unsafe-violations-in-http-response". - resolvers: domain name conversion to lowercase in responses was performed on the whole string, hence on the length delimiters as well. For very long names (65 to 90 chars per component) this would result on artificially inflating the name and possibly even crash the process in some cases. - FastCGI: a crash might be triggered by a non-compliant server sending records with malformed names/values. In addition, a theoretically possible case of crash was addressed in the fcgi_send() function where a stream might possibly remove itself from a list that is being scanned, though we're not sure how this could be triggered. - A slow memory leak of SSL captures has been noticed over the last two years on haproxy.org, making us believe that it was in the SSL lib, because the counters we placed around it showed more calls to the init() callback than the release() one. We were actually wrong and discovered that in TLS 1.3 there can be two consecutive Client Hello messages on a connection and that this caused the capture area to be allocated twice and only the last one was freed. At least it explained everything, and this was fixed (and confirms to no longer leak). - frontend sockets in transparent mode will now ignore conntrack so as not to return the wrong source/destination addresses in case a late retransmit happens from the local host after the connection expires. - minor stuff (missing check for allocation failure when calling EVP_Digest* in the sha2() converter, upgrade to websocket for dispatch/ transparent). Please find the usual URLs below : Site index : https://www.haproxy.org/ Documentation : https://docs.haproxy.org/ Wiki : https://github.com/haproxy/wiki/wiki Discourse : https://discourse.haproxy.org/ Slack channel : https://slack.haproxy.org/ Issue tracker : https://github.com/haproxy/haproxy/issues Sources : https://www.haproxy.org/download/2.6/src/ Git repository : https://git.haproxy.org/git/haproxy-2.6.git/ Git Web browsing : https://git.haproxy.org/?p=haproxy-2.6.git Changelog : https://www.haproxy.org/download/2.6/src/CHANGELOG Dataplane API : https://github.com/haproxytech/dataplaneapi/releases/latest Pending bugs : https://www.haproxy.org/l/pending-bugs Reviewed bugs : https://www.haproxy.org/l/reviewed-bugs Code reports : https://www.haproxy.org/l/code-reports Latest builds : https://www.haproxy.org/l/dev-packages Willy --- Complete changelog : Aurelien DARRAGON (1): BUG/MINOR: sink: retry attempt for sft server may never occur Christopher Faulet (6): BUG/MINOR: h1-htx: Be sure that H1 response version starts by "HTTP/" BUG/MAJOR: fcgi: Fix param decoding by properly checking its size BUG/MAJOR: resolvers: Properly lowered the names found in DNS response BUG/MEDIUM: mux-fcgi: Use a safe loop to resume each stream eligible for sending BUG/MINOR: ssl-sample: Fix sample_conv_sha2() by checking EVP_Digest* failures BUG/MINOR: backend: Don't get proto to use for webscoket if there is no server Frederic Lecaille (3): BUG/MAJOR: qpack: unchecked length passed to huffman decoder BUG/MINOR: qpack: fix 1-byte OOB read in qpack_decode_fs_pfx() BUG/MEDIUM: qpack: correctly deal with too large decoded numbers Valentine Krasnobaeva (1): BUG/MINOR: resolvers: always normalize FQDN from response William Lallemand (2): CI: vtest: move the vtest2 URL to vinyl-cache.org CI: github: disable windows.yml by default on unofficials repo Willy Tarreau (6): BUG/MEDIUM: ssl: take care of second client hello BUG/MINOR: ssl: always clear the remains of the first hello for the second one BUILD: makefile: disable tail calls optimizations with memory profiling BUG/MEDIUM: hpack: correctly deal with too large decoded numbers SCRIPTS: git-show-backports: hide the common ancestor warning in quiet mode SCRIPTS: git-show-backports: add a restart-from-last option ---

