Home

Description

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-10 | Updated 2026-03-11 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-248: Uncaught Exception

Product status

< 0.11.14
affected

References

github.com/.../quinn/security/advisories/GHSA-6xvm-j4wr-6v98

cve.org (CVE-2026-31812)

nvd.nist.gov (CVE-2026-31812)

Download JSON