Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-31812

Опубликовано: 10 мар. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw was found in quinn-proto, a pure-Rust implementation of the IETF QUIC transport protocol. A remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication.

Отчет

The availability impact of this flaw is limited to specific services on Red Hat systems. Host system availability is not at risk.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Confidential Compute Attestationbuild-of-trustee/trustee-rhel9Affected
Confidential Compute Attestationconfidential-compute-attestation-tech-preview/trustee-rhel9Affected
Confidential Compute Attestationopenshift-sandboxed-containers/osc-monitor-rhel9Affected
Confidential Compute Attestationopenshift-sandboxed-containers/osc-operator-bundleAffected
Confidential Compute Attestationopenshift-sandboxed-containers/osc-podvm-builder-rhel9Affected
Confidential Compute Attestationopenshift-sandboxed-containers/osc-podvm-payload-rhel9Affected
Confidential Compute Attestationopenshift-sandboxed-containers/osc-rhel9-operatorAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/cluster-logging-operator-bundleAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/cluster-logging-rhel9-operatorAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/eventrouter-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-248
https://bugzilla.redhat.com/show_bug.cgi?id=2446330quinn-proto: quinn-proto: Denial of Service via crafted QUIC Initial packet

EPSS

Процентиль: 43%
0.00205
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

ubuntu
17 дней назад

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

nvd
17 дней назад

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

debian
17 дней назад

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC ...

github
16 дней назад

Quinn affected by unauthenticated remote DoS via panic in QUIC transport parameter parsing

EPSS

Процентиль: 43%
0.00205
Низкий

5.3 Medium

CVSS3