Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4w32-2493-32g7 | Yamux vulnerable to remote Panic via malformed WindowUpdate credit |
Thu, 19 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Protocol
Protocol yamux |
|
| CPEs | cpe:2.3:a:protocol:yamux:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Protocol
Protocol yamux |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libp2p
Libp2p rust-yamux |
|
| Vendors & Products |
Libp2p
Libp2p rust-yamux |
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9. | |
| Title | Yamux remote Panic via malformed WindowUpdate credit | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T19:38:02.290Z
Reserved: 2026-03-09T16:33:42.914Z
Link: CVE-2026-31814
Updated: 2026-03-13T19:37:58.086Z
Status : Analyzed
Published: 2026-03-13T19:54:36.470
Modified: 2026-03-19T13:51:44.067
Link: CVE-2026-31814
No data.
OpenCVE Enrichment
Updated: 2026-03-23T13:40:14Z
Github GHSA