Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.
References
| Link | Resource |
|---|---|
| https://github.com/libp2p/rust-yamux/security/advisories/GHSA-vxx9-2994-q338 | Exploit Vendor Advisory |
Configurations
History
19 Mar 2026, 14:30
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:protocol:yamux:*:*:*:*:*:rust:*:* | |
| Summary |
|
|
| First Time |
Protocol
Protocol yamux |
|
| References | () https://github.com/libp2p/rust-yamux/security/advisories/GHSA-vxx9-2994-q338 - Exploit, Vendor Advisory |
16 Mar 2026, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:19
Updated : 2026-03-19 14:30
NVD link : CVE-2026-32314
Mitre link : CVE-2026-32314
CVE.ORG link : CVE-2026-32314
JSON object : View
Products Affected
protocol
- yamux
CWE
CWE-248
Uncaught Exception
