On Thu, Feb 12, 2026 at 03:13:41PM +0100, Amaury Denoyelle wrote:
> Hi,
> 
> This release comes a bit earlier than expected. The reason is that it
> contains two major fixes related to QUIC. These bugs were reported by
> Asim Viladi Oglu Manizada and can be exploited to remotely trigger a
> crash of the process. So please upgrade immediately if you're using QUIC
> listeners. Note that by default, QUIC is not enabled, so only users with
> explicit QUIC bind lines added in the configuration are vulnerable. Use
> the following command on your config files to find matching lines :
> 
>   $ grep '^[^#]*bind.*quic' <config_file>
> 
> The two patches are related to the QUIC packet parsing code. The first
> case is an integer overflow when handling a token and is assigned to
> CVE-2026-26081 report. The second one happens when decoding the frame
> type and causes an infinite loop which triggers the haproxy watchdog. It
> is assigned to CVE-2026-26080 report. If you want more details, please
> refer to the following article from the haproxy.com blog :
> 
>   https://www.haproxy.com/blog/cves-2026-quic-denial-of-service

Thanks Amaury for handling these ones. I'm realizing that we didn't
speak about 3.4-dev here. Since the rare users of 3.4-dev are already
100% autonomous on patching/updating/rollbacks and the risk is super
low (just a crash, nothing exceptional for -dev), there are no plans
to issue an intermediary 3.4-dev with just that, so 3.4-dev5 is still
going to be issued next week.

Willy


Reply via email to