CVE-2024-49214
Publication date 14 October 2024
Last updated 29 October 2024
Ubuntu priority
QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
Status
Package | Ubuntu Release | Status |
---|---|---|
haproxy | 24.10 oracular |
Vulnerable
|
24.04 LTS noble |
Vulnerable, fix deferred
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
Notes
mdeslaur
Per the CVE description, this affects 2.9.x+, per the commit description, this affects 2.6+. As of 2024-10-29, there is no backport to 2.8.x available.
Patch details
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2024-49214
- https://www.haproxy.org/download/3.1/src/CHANGELOG
- https://www.haproxy.org/download/3.0/src/CHANGELOG
- https://www.haproxy.org/download/2.9/src/CHANGELOG
- https://www.mail-archive.com/haproxy%40formilux.org/msg45291.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg45314.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg45315.html