OESA-2024-2273

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2273
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2273.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2024-2273
Upstream
Published
2024-10-18T11:09:24Z
Modified
2025-09-03T06:20:34.157565Z
Summary
haproxy security update
Details

HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for very high traffic web sites and powers quite a number of the world's most visited ones.

Security Fix(es):

QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.(CVE-2024-49214)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / haproxy

Package

Name
haproxy
Purl
pkg:rpm/openEuler/haproxy&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.5-5.oe2403

Ecosystem specific

{
    "src": [
        "haproxy-2.9.5-5.oe2403.src.rpm"
    ],
    "aarch64": [
        "haproxy-2.9.5-5.oe2403.aarch64.rpm",
        "haproxy-debuginfo-2.9.5-5.oe2403.aarch64.rpm",
        "haproxy-debugsource-2.9.5-5.oe2403.aarch64.rpm"
    ],
    "noarch": [
        "haproxy-help-2.9.5-5.oe2403.noarch.rpm"
    ],
    "x86_64": [
        "haproxy-2.9.5-5.oe2403.x86_64.rpm",
        "haproxy-debuginfo-2.9.5-5.oe2403.x86_64.rpm",
        "haproxy-debugsource-2.9.5-5.oe2403.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2024-2273.json"