Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-31812

Опубликовано: 10 мар. 2026
Источник: debian
EPSS Низкий

Описание

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-quinn-protofixed0.11.14-1package
rust-quinn-protono-dsatrixiepackage
rust-quinn-protono-dsabookwormpackage

Примечания

  • https://rustsec.org/advisories/RUSTSEC-2026-0037.html

  • https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98

  • https://github.com/quinn-rs/quinn/pull/2558

  • Fixed by: https://github.com/quinn-rs/quinn/commit/655a8ad094e4fad463c90c4666c62db7de56384b

EPSS

Процентиль: 43%
0.00205
Низкий

Связанные уязвимости

ubuntu
17 дней назад

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

CVSS3: 5.3
redhat
17 дней назад

A flaw was found in quinn-proto, a pure-Rust implementation of the IETF QUIC transport protocol. A remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication.

nvd
17 дней назад

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

github
17 дней назад

Quinn affected by unauthenticated remote DoS via panic in QUIC transport parameter parsing

EPSS

Процентиль: 43%
0.00205
Низкий