CVE-2026-26080

NameCVE-2026-26080
DescriptionBUG/MAJOR: quic: fix parsing frame type
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
haproxy (PTS)bullseye2.2.9-2+deb11u6fixed
bullseye (security)2.2.9-2+deb11u7fixed
bookworm, bookworm (security)2.6.12-1+deb12u3fixed
trixie3.0.11-1+deb13u1fixed
trixie (security)3.0.11-1+deb13u2fixed
forky3.2.11-1vulnerable
sid3.2.11-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
haproxysourcebullseye(not affected)
haproxysourcebookworm(not affected)
haproxysourcetrixie(not affected)
haproxysource(unstable)3.2.11-2

Notes

[trixie] - haproxy <not-affected> (Vulnerable code introduced later)
[bookworm] - haproxy <not-affected> (Vulnerable code introduced later)
[bullseye] - haproxy <not-affected> (Vulnerable code introduced later)
Fixed by: https://git.haproxy.org/?p=haproxy-3.2.git;a=commit;h=5bb098ce8a656ec5711b4de3e4c87f12b216e7a1 (v3.2.12)

Search for package or bug name: Reporting problems