CVE-2026-26081

NameCVE-2026-26081
DescriptionBUG/MAJOR: quic: reject invalid token
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6130-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
haproxy (PTS)bullseye2.2.9-2+deb11u6fixed
bullseye (security)2.2.9-2+deb11u7fixed
bookworm, bookworm (security)2.6.12-1+deb12u3fixed
trixie3.0.11-1+deb13u1vulnerable
trixie (security)3.0.11-1+deb13u2fixed
forky, sid3.2.11-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
haproxysourcebullseye(not affected)
haproxysourcebookworm(not affected)
haproxysourcetrixie3.0.11-1+deb13u2DSA-6130-1
haproxysource(unstable)(unfixed)

Notes

[bookworm] - haproxy <not-affected> (Vulnerable code introduced later)
[bullseye] - haproxy <not-affected> (Vulnerable code introduced later)
Fixed by: https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=a05eade0f07483e6b6d0b61b1749e9093647e802 (v3.0.16)
Fixed by: https://git.haproxy.org/?p=haproxy-3.2.git;a=commit;h=4765277f4f915baac2d57db63538ff0a59966deb (v3.2.12)

Search for package or bug name: Reporting problems