Skip to content

x/vulndb: potential Go vuln in github.com/traefik/traefik: CVE-2024-39321 #2973

@GoVulnBot

Description

@GoVulnBot

Advisory CVE-2024-39321 references a vulnerability in the following Go modules:

Module
github.com/traefik/traefik

Description:
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/traefik/traefik
      vulnerable_at: 1.7.34
summary: CVE-2024-39321 in github.com/traefik/traefik
cves:
    - CVE-2024-39321
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39321
    - web: https://github.com/traefik/traefik/releases/tag/v2.11.6
    - web: https://github.com/traefik/traefik/releases/tag/v3.0.4
    - web: https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3
    - web: https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9
source:
    id: CVE-2024-39321
    created: 2024-07-05T19:01:11.331696342Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions