CVE-2026-32314

HIGH

Yamux remote Panic via malformed Data frame with SYN set and len = 262145

Title source: cna
STIX 2.1

Description

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

Scores

CVSS v3 7.5
EPSS 0.0008
EPSS Percentile 24.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-248
Status published
Products (3)
crates.io/yamux 0 - 0.13.10crates.io
libp2p/rust-yamux < 0.13.10
protocol/yamux < 0.13.10
Published Mar 16, 2026
Tracked Since Mar 16, 2026