Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vxx9-2994-q338 | Yamux vulnerable to remote Panic via malformed Data frame with SYN set and len = 262145 |
Thu, 19 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Protocol
Protocol yamux |
|
| CPEs | cpe:2.3:a:protocol:yamux:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Protocol
Protocol yamux |
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libp2p
Libp2p rust-yamux |
|
| Vendors & Products |
Libp2p
Libp2p rust-yamux |
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10. | |
| Title | Yamux remote Panic via malformed Data frame with SYN set and len = 262145 | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T13:48:29.665Z
Reserved: 2026-03-11T21:16:21.660Z
Link: CVE-2026-32314
Updated: 2026-03-16T13:48:04.294Z
Status : Analyzed
Published: 2026-03-16T14:19:34.030
Modified: 2026-03-19T14:30:43.087
Link: CVE-2026-32314
No data.
OpenCVE Enrichment
Updated: 2026-03-23T13:40:05Z
Github GHSA