{"id":"RUSTSEC-2026-0037","summary":"Denial of service in Quinn endpoints","details":"Receiving QUIC transport parameters containing invalid values could lead to a panic.\n\nUnfortunately the maintainers did not properly assess usage of `unwrap()` calls in the\ntransport parameters parsing code, and we did not have sufficient fuzzing coverage to find this\nissue. We have since added a fuzzing target to cover this code path.","aliases":["CVE-2026-31812","GHSA-6xvm-j4wr-6v98"],"modified":"2026-03-14T07:30:14.675976Z","published":"2026-03-09T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/quinn-proto"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0037.html"},{"type":"WEB","url":"https://github.com/quinn-rs/quinn/pull/2559"}],"affected":[{"package":{"name":"quinn-proto","ecosystem":"crates.io","purl":"pkg:cargo/quinn-proto"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.5.0"},{"fixed":"0.11.14"}]}],"ecosystem_specific":{"affects":{"arch":[],"os":[],"functions":[]},"affected_functions":null},"database_specific":{"categories":["denial-of-service"],"cvss":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0037.json","informational":null}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}]}