Логотип exploitDog
bind:CVE-2026-32314
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-32314

Количество 4

Количество 4

ubuntu логотип

CVE-2026-32314

13 дней назад

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-32314

13 дней назад

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-32314

13 дней назад

Yamux is a stream multiplexer over reliable, ordered connections such ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-vxx9-2994-q338

16 дней назад

Yamux vulnerable to remote Panic via malformed Data frame with SYN set and len = 262145

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-32314

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

CVSS3: 7.5
0%
Низкий
13 дней назад
nvd логотип
CVE-2026-32314

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

CVSS3: 7.5
0%
Низкий
13 дней назад
debian логотип
CVE-2026-32314

Yamux is a stream multiplexer over reliable, ordered connections such ...

CVSS3: 7.5
0%
Низкий
13 дней назад
github логотип
GHSA-vxx9-2994-q338

Yamux vulnerable to remote Panic via malformed Data frame with SYN set and len = 262145

0%
Низкий
16 дней назад

Уязвимостей на страницу