Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-31814

Опубликовано: 13 мар. 2026
Источник: debian
EPSS Низкий

Описание

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-yamuxfixed0.13.9+ds-1package
rust-yamuxno-dsatrixiepackage

Примечания

  • https://github.com/libp2p/rust-yamux/security/advisories/GHSA-4w32-2493-32g7

  • Fixed by: https://github.com/libp2p/rust-yamux/commit/b1aae09d60c0bd6a5915a5448f4e8cbc5174db53 (yamux-v0.13.9)

EPSS

Процентиль: 22%
0.00071
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
16 дней назад

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.

CVSS3: 7.5
nvd
16 дней назад

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.

github
16 дней назад

Yamux vulnerable to remote Panic via malformed WindowUpdate credit

EPSS

Процентиль: 22%
0.00071
Низкий