Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.
CVSS
No CVSS.
References
Configurations
No configuration.
History
11 Mar 2026, 13:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 22:16
Updated : 2026-03-11 13:52
NVD link : CVE-2026-31812
Mitre link : CVE-2026-31812
CVE.ORG link : CVE-2026-31812
JSON object : View
Products Affected
No product.
CWE
CWE-248
Uncaught Exception
