{"id":"CVE-2026-31812","summary":"Quinn affected by unauthenticated remote DoS via panic in QUIC transport parameter parsing","details":"Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.","aliases":["GHSA-6xvm-j4wr-6v98","RUSTSEC-2026-0037"],"modified":"2026-04-29T18:29:35.280139326Z","published":"2026-03-10T21:04:36.812Z","related":["CGA-cq2m-2ghh-c6hg","SUSE-RU-2026:1001-1","SUSE-SU-2026:1337-1","SUSE-SU-2026:1415-1","SUSE-SU-2026:21357-1","openSUSE-SU-2026:10380-1","openSUSE-SU-2026:10382-1","openSUSE-SU-2026:10383-1","openSUSE-SU-2026:10384-1","openSUSE-SU-2026:20569-1"],"database_specific":{"cwe_ids":["CWE-248"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31812.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31812.json"},{"type":"ADVISORY","url":"https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31812"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/quinn-rs/quinn","events":[{"introduced":"0"},{"fixed":"2c315aa7f9c2a6c1db87f8f51f40623a427c78fd"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.11.14"}]}}],"versions":["0.1.0","0.10.0","0.10.1","0.11.0","0.11.1","0.11.2","0.2.0","0.3.0","0.4.0","0.5.0","0.6.0","0.6.1","0.7.0","0.8.0","0.9.0","0.9.1","0.9.2","0.9.3","pre-quinn-quicr","quinn-0.11.2","quinn-0.11.3","quinn-0.11.4","quinn-0.11.5","quinn-0.11.6","quinn-0.11.7","quinn-0.11.8","quinn-0.11.9","quinn-proto-0.11.10","quinn-proto-0.11.11","quinn-proto-0.11.12","quinn-proto-0.11.13","quinn-proto-0.11.3","quinn-proto-0.11.4","quinn-proto-0.11.5","quinn-proto-0.11.6","quinn-proto-0.11.7","quinn-proto-0.11.8","quinn-proto-0.11.9","quinn-udp-0.5.10","quinn-udp-0.5.11","quinn-udp-0.5.12","quinn-udp-0.5.13","quinn-udp-0.5.14","quinn-udp-0.5.2","quinn-udp-0.5.3","quinn-udp-0.5.4","quinn-udp-0.5.5","quinn-udp-0.5.6","quinn-udp-0.5.7","quinn-udp-0.5.8","quinn-udp-0.5.9","udp-0.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31812.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}]}