<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>RustSec Advisories</title><id>https://rustsec.org/feed.xml</id><updated>2026-03-14T12:00:00+00:00</updated><author><name>RustSec</name></author><icon>https://rustsec.org/favicon.ico</icon><link href="https://rustsec.org/feed.xml" rel="self" type="application/atom+xml"/><link href="https://rustsec.org/" rel="alternate" type="text/html"/><subtitle xml:lang="en">Security advisories filed against Rust crates</subtitle><entry><title>RUSTSEC-2026-0040: Vulnerability in tracing-ethers</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0040.html</id><updated>2026-03-14T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0040.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0040: Vulnerability in tracing-ethers"/><published>2026-03-14T12:00:00+00:00</published><summary xml:lang="en">`tracing-ethers` was removed from crates.io due to malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/tracing-ethers/RUSTSEC-2026-0040.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/tracing-ethers/RUSTSEC-2026-0040.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0040&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0040
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;tracing-ethers&lt;/code&gt; was removed from crates.io due to malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-14&quot;&gt;
          March 14, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-14&quot;&gt;
          March 14, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/tracing-ethers.html&quot;&gt;tracing-ethers&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/tracing-ethers&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;tracing-ethers&lt;/code&gt; crate attempted to exfiltrate ssh keys to an app hosted on &lt;code&gt;vercel.app&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;The malicious crate had 9 version published on 2026-03-09 approximately 5 days
before removal and had no evidence of actual downloads. There were no crates
depending on this crate on crates.io.&lt;/p&gt;
&lt;p&gt;Thanks to the user &lt;code&gt;killa&lt;/code&gt; for reporting this malicious crate.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0038: Vulnerability in rssn</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0038.html</id><updated>2026-03-11T12:00:00+00:00</updated><category term="code-execution"/><category term="memory-corruption"/><category term="memory-exposure"/><category term="privilege-escalation"/><link href="https://rustsec.org/advisories/RUSTSEC-2026-0038.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0038: Vulnerability in rssn"/><published>2026-03-10T12:00:00+00:00</published><summary xml:lang="en">RustSec Advisory</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/rssn/RUSTSEC-2026-0038.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/rssn/RUSTSEC-2026-0038.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0038&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0038
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;RustSec Advisory&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-08&quot;&gt;
          March  8, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-10&quot;&gt;
          March 10, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-11&quot;&gt;
          (last modified: March 11, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/rssn.html&quot;&gt;rssn&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/rssn&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;categories&quot;&gt;Categories&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/code-execution.html&quot;&gt;code-execution&lt;/a&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/memory-corruption.html&quot;&gt;memory-corruption&lt;/a&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/memory-exposure.html&quot;&gt;memory-exposure&lt;/a&gt;&lt;/li&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/privilege-escalation.html&quot;&gt;privilege-escalation&lt;/a&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;keywords&quot;&gt;Keywords&lt;/dt&gt;
      &lt;dd&gt;
        
          &lt;a href=&quot;/keywords/jit.html&quot;&gt;#jit&lt;/a&gt;
        
          &lt;a href=&quot;/keywords/ace.html&quot;&gt;#ace&lt;/a&gt;
        
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30960&quot;&gt;CVE-2026-30960&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-9c4h-pwmf-m6fj&quot;&gt;GHSA-9c4h-pwmf-m6fj&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj&quot;&gt;
              https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;9.4 &lt;span class=&quot;tag critical&quot;&gt;
        CRITICAL
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Local&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&quot;&gt;CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.2.9&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;unaffected&quot;&gt;Unaffected&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;0.1.20&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;h2&gt;Impact&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Vulnerability Type&lt;/strong&gt;:
Improper Control of Generation of Code (&apos;Code Injection&apos;) (CWE-94) / Improper Check for Unusual or Exceptional Conditions (CWE-754) / Improper Input Validation (CWE-20) / Use of Low-Level Functionality (CWE-695) / Improper Privilege Management (CWE-269) / External Control of System or Configuration Setting (CWE-15).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Technical Details&lt;/strong&gt;:
The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.&lt;/p&gt;
&lt;h2&gt;Who is Impacted?&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Developers using the library as a dynamic linked library (.so, .dll, .dylib) in multi-language environments (e.g., Python, Node.js, C++).&lt;/li&gt;
&lt;li&gt;Cloud Service Providers running the library in multi-tenant environments or automated model-training pipelines.&lt;/li&gt;
&lt;li&gt;Users processing untrusted or third-party datasets/models that may trigger malicious JIT instruction generation.
Patches&lt;/li&gt;
&lt;li&gt;Affected versions: &amp;lt; 0.2.8&lt;/li&gt;
&lt;li&gt;Patched version: 0.2.9&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;If you cannot upgrade immediately, please consider the following mitigations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Strict Sandboxing: Run the library within a restricted sandbox (e.g., WebAssembly, Docker with non-root user, or seccomp profiles) to limit system call access.&lt;/li&gt;
&lt;li&gt;Principle of Least Privilege: Ensure the process calling the library does not have administrative or root privileges.&lt;/li&gt;
&lt;li&gt;Input Filtering: If possible, implement an application-level validation layer to sanitize any data passed to the CFFI interfaces.&lt;/li&gt;
&lt;li&gt;Disable JIT (if applicable): If your workload allows, use the interpreter-only mode (if provided by the library) to bypass the JIT engine entirely.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://security.apich.org/&quot;&gt;Apich Organization Security Team Homepage&lt;/a&gt;&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC-BY-4.0.html&quot;&gt;CC-BY-4.0&lt;/a&gt;
    license.

    
      
      
          Source: &lt;a href=&quot;https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj&quot;&gt;https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj&lt;/a&gt;
        
    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0039: Vulnerability in chrono_anchor</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0039.html</id><updated>2026-03-10T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0039.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0039: Vulnerability in chrono_anchor"/><published>2026-03-10T12:00:00+00:00</published><summary xml:lang="en">`chrono_anchor` was removed from crates.io due to malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/chrono_anchor/RUSTSEC-2026-0039.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/chrono_anchor/RUSTSEC-2026-0039.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0039&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0039
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;chrono_anchor&lt;/code&gt; was removed from crates.io due to malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-10&quot;&gt;
          March 10, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-10&quot;&gt;
          March 10, 2026
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/chrono_anchor.html&quot;&gt;chrono_anchor&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/chrono_anchor&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;chrono_anchor&lt;/code&gt; crate attempted to exfiltrate &lt;code&gt;.env&lt;/code&gt; files to a server that
was in turn impersonating the legitimate &lt;code&gt;timeapi.io&lt;/code&gt; service.&lt;/p&gt;
&lt;p&gt;The malicious crate had 1 version published on 2026-03-04 approximately 6 days
before removal and had no evidence of actual downloads. There were no crates
depending on this crate on crates.io.&lt;/p&gt;
&lt;p&gt;Thanks to &lt;a href=&quot;https://socket.dev&quot;&gt;Socket&lt;/a&gt; for reporting this crate. They have published
&lt;a href=&quot;https://socket.dev/blog/5-malicious-rust-crates-posed-as-time-utilities-to-exfiltrate-env-files&quot;&gt;a blog post&lt;/a&gt; about this recent campaign, and we advise users of
&lt;code&gt;timeapi.io&lt;/code&gt; to exercise caution when using crates to interact with that
service.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0037: Vulnerability in quinn-proto</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0037.html</id><updated>2026-03-14T12:00:00+00:00</updated><category term="denial-of-service"/><link href="https://rustsec.org/advisories/RUSTSEC-2026-0037.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0037: Vulnerability in quinn-proto"/><published>2026-03-09T12:00:00+00:00</published><summary xml:lang="en">Denial of service in Quinn endpoints</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/quinn-proto/RUSTSEC-2026-0037.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/quinn-proto/RUSTSEC-2026-0037.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0037&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0037
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Denial of service in Quinn endpoints&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-09&quot;&gt;
          March  9, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-09&quot;&gt;
          March  9, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-14&quot;&gt;
          (last modified: March 14, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/quinn-proto.html&quot;&gt;quinn-proto&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/quinn-proto&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;categories&quot;&gt;Categories&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;a href=&quot;/categories/denial-of-service.html&quot;&gt;denial-of-service&lt;/a&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;keywords&quot;&gt;Keywords&lt;/dt&gt;
      &lt;dd&gt;
        
          &lt;a href=&quot;/keywords/panic.html&quot;&gt;#panic&lt;/a&gt;
        
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31812&quot;&gt;CVE-2026-31812&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-6xvm-j4wr-6v98&quot;&gt;GHSA-6xvm-j4wr-6v98&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://github.com/quinn-rs/quinn/pull/2559&quot;&gt;
              https://github.com/quinn-rs/quinn/pull/2559
            &lt;/a&gt;
          &lt;/li&gt;
        
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;8.7 &lt;span class=&quot;tag high&quot;&gt;
        HIGH
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.11.14&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      
      &lt;dt id=&quot;unaffected&quot;&gt;Unaffected&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#60;0.5.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;Receiving QUIC transport parameters containing invalid values could lead to a panic.&lt;/p&gt;
&lt;p&gt;Unfortunately the maintainers did not properly assess usage of &lt;code&gt;unwrap()&lt;/code&gt; calls in the
transport parameters parsing code, and we did not have sufficient fuzzing coverage to find this
issue. We have since added a fuzzing target to cover this code path.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0036: Vulnerability in time-sync</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0036.html</id><updated>2026-03-06T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0036.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0036: Vulnerability in time-sync"/><published>2026-03-05T12:00:00+00:00</published><summary xml:lang="en">`time-sync` was removed from crates.io due to malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/time-sync/RUSTSEC-2026-0036.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/time-sync/RUSTSEC-2026-0036.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0036&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0036
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;time-sync&lt;/code&gt; was removed from crates.io due to malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          March  5, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-06&quot;&gt;
          (last modified: March  6, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/time-sync.html&quot;&gt;time-sync&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/time-sync&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-mh23-rw7f-v5pq&quot;&gt;GHSA-mh23-rw7f-v5pq&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;time-sync&lt;/code&gt; crate attempted to exfiltrate &lt;code&gt;.env&lt;/code&gt; files to a server that was
in turn impersonating the legitimate &lt;code&gt;timeapi.io&lt;/code&gt; service. This the same attack
that we&apos;ve seen three times in the last few days.&lt;/p&gt;
&lt;p&gt;The malicious crate had 1 version published on 2026-03-04 approximately 50
minutes before removal and had no evidence of actual downloads. There were no
crates depending on this crate on crates.io.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0033: Vulnerability in pingora-core</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0033.html</id><updated>2026-03-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0033.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0033: Vulnerability in pingora-core"/><published>2026-03-05T12:00:00+00:00</published><summary xml:lang="en">HTTP Request Smuggling via Premature Upgrade</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/pingora-core/RUSTSEC-2026-0033.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/pingora-core/RUSTSEC-2026-0033.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0033&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0033
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;HTTP Request Smuggling via Premature Upgrade&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          March  5, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-09&quot;&gt;
          (last modified: March  9, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/pingora-core.html&quot;&gt;pingora-core&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/pingora-core&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      
      &lt;dt id=&quot;keywords&quot;&gt;Keywords&lt;/dt&gt;
      &lt;dd&gt;
        
          &lt;a href=&quot;/keywords/http.html&quot;&gt;#http&lt;/a&gt;
        
          &lt;a href=&quot;/keywords/request-smuggling.html&quot;&gt;#request-smuggling&lt;/a&gt;
        
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2833&quot;&gt;CVE-2026-2833&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-xq2h-p299-vjwv&quot;&gt;GHSA-xq2h-p299-vjwv&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/&quot;&gt;
              https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/
            &lt;/a&gt;
          &lt;/li&gt;
        
        
          &lt;li&gt;
            &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2026-2833&quot;&gt;
              https://nvd.nist.gov/vuln/detail/CVE-2026-2833
            &lt;/a&gt;
          &lt;/li&gt;
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;9.3 &lt;span class=&quot;tag critical&quot;&gt;
        CRITICAL
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.8.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;Pingora versions prior to 0.8.0 would immediately forward bytes following a request with an Upgrade header to the backend, without waiting for a 101 Switching Protocols response. This allows an attacker to smuggle requests to the backend and bypass proxy-level security controls.&lt;/p&gt;
&lt;p&gt;This vulnerability primarily affects standalone Pingora deployments where a Pingora proxy is exposed to external traffic. An attacker could exploit this to bypass proxy-level ACL controls and WAF logic, poison caches and upstream connections, or perform cross-user attacks by hijacking sessions.&lt;/p&gt;
&lt;p&gt;This flaw was corrected in commit 824bdeefc61e121cc8861de1b35e8e8f39026ecd by only switching connection modes after receiving a 101 response from the backend. Users should upgrade to Pingora &amp;gt;= 0.8.0.&lt;/p&gt;
&lt;p&gt;Note: Cloudflare customers and Cloudflare&apos;s CDN infrastructure were not affected by this vulnerability, as ingress proxies in the CDN stack maintain proper HTTP parsing boundaries and do not prematurely switch to upgraded connection forwarding mode.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0034: Vulnerability in pingora-core</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0034.html</id><updated>2026-03-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0034.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0034: Vulnerability in pingora-core"/><published>2026-03-05T12:00:00+00:00</published><summary xml:lang="en">HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/pingora-core/RUSTSEC-2026-0034.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/pingora-core/RUSTSEC-2026-0034.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0034&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0034
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          March  5, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-09&quot;&gt;
          (last modified: March  9, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/pingora-core.html&quot;&gt;pingora-core&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/pingora-core&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      
      &lt;dt id=&quot;keywords&quot;&gt;Keywords&lt;/dt&gt;
      &lt;dd&gt;
        
          &lt;a href=&quot;/keywords/http.html&quot;&gt;#http&lt;/a&gt;
        
          &lt;a href=&quot;/keywords/request-smuggling.html&quot;&gt;#request-smuggling&lt;/a&gt;
        
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2835&quot;&gt;CVE-2026-2835&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-hj7x-879w-vrp7&quot;&gt;GHSA-hj7x-879w-vrp7&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/&quot;&gt;
              https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/
            &lt;/a&gt;
          &lt;/li&gt;
        
        
          &lt;li&gt;
            &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2026-2835&quot;&gt;
              https://nvd.nist.gov/vuln/detail/CVE-2026-2835
            &lt;/a&gt;
          &lt;/li&gt;
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;9.3 &lt;span class=&quot;tag critical&quot;&gt;
        CRITICAL
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.8.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;Pingora versions prior to 0.8.0 improperly allowed HTTP/1.0 request bodies to be close-delimited and incorrectly handled multiple Transfer-Encoding values. This allows an attacker to desync Pingora&apos;s request framing from backend servers and smuggle requests to the backend.&lt;/p&gt;
&lt;p&gt;This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/1.0 requests. An attacker could exploit this to bypass proxy-level ACL controls and WAF logic, poison caches and upstream connections, or perform cross-user attacks by hijacking sessions.&lt;/p&gt;
&lt;p&gt;This flaw was corrected in commits 7f7166d62fa916b9f11b2eb8f9e3c4999e8b9023, 40c3c1e9a43a86b38adeab8da7a2f6eba68b83ad, and 87e2e2fb37edf9be33e3b1d04726293ae6bf2052 by correctly parsing message length headers per RFC 9112. Users should upgrade to Pingora &amp;gt;= 0.8.0.&lt;/p&gt;
&lt;p&gt;Note: Cloudflare customers and Cloudflare&apos;s CDN infrastructure were not affected by this vulnerability, as its ingress proxy layers rejected ambiguous framing such as invalid Content-Length values and internally forwarded non-ambiguous message length framing headers.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0035: Vulnerability in pingora-cache</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0035.html</id><updated>2026-03-09T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0035.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0035: Vulnerability in pingora-cache"/><published>2026-03-05T12:00:00+00:00</published><summary xml:lang="en">Cache poisoning via insecure-by-default cache key</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/pingora-cache/RUSTSEC-2026-0035.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/pingora-cache/RUSTSEC-2026-0035.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0035&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0035
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;Cache poisoning via insecure-by-default cache key&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          March  5, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-09&quot;&gt;
          (last modified: March  9, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/pingora-cache.html&quot;&gt;pingora-cache&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/pingora-cache&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      
      &lt;dt id=&quot;keywords&quot;&gt;Keywords&lt;/dt&gt;
      &lt;dd&gt;
        
          &lt;a href=&quot;/keywords/http.html&quot;&gt;#http&lt;/a&gt;
        
          &lt;a href=&quot;/keywords/cache-poisoning.html&quot;&gt;#cache-poisoning&lt;/a&gt;
        
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2836&quot;&gt;CVE-2026-2836&lt;/a&gt;
            
          &lt;/li&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-f93w-pcj3-rggc&quot;&gt;GHSA-f93w-pcj3-rggc&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      
      &lt;dt id=&quot;details&quot;&gt;References&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
        
          &lt;li&gt;
            &lt;a href=&quot;https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/&quot;&gt;
              https://blog.cloudflare.com/pingora-oss-smuggling-vulnerabilities/
            &lt;/a&gt;
          &lt;/li&gt;
        
        
          &lt;li&gt;
            &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2026-2836&quot;&gt;
              https://nvd.nist.gov/vuln/detail/CVE-2026-2836
            &lt;/a&gt;
          &lt;/li&gt;
        
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      
      &lt;dt id=&quot;cvss_score&quot;&gt;CVSS Score&lt;/dt&gt;
      &lt;dd&gt;8.4 &lt;span class=&quot;tag high&quot;&gt;
        HIGH
      &lt;/span&gt;&lt;/dd&gt;

      &lt;dt id=&quot;cvss_details&quot;&gt;CVSS Details&lt;/dt&gt;
      &lt;dd&gt;
        &lt;dl&gt;
          
            &lt;dt&gt;Attack Complexity&lt;/dt&gt;
            &lt;dd&gt;Low&lt;/dd&gt;
          
            &lt;dt&gt;Attack Requirements&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Attack Vector&lt;/dt&gt;
            &lt;dd&gt;Network&lt;/dd&gt;
          
            &lt;dt&gt;Privileges Required&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Subsequent System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
            &lt;dt&gt;User Interaction&lt;/dt&gt;
            &lt;dd&gt;Passive&lt;/dd&gt;
          
            &lt;dt&gt;Availability Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Confidentiality Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;None&lt;/dd&gt;
          
            &lt;dt&gt;Integrity Impact to the Vulnerable System&lt;/dt&gt;
            &lt;dd&gt;High&lt;/dd&gt;
          
        &lt;/dl&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;cvss&quot;&gt;CVSS Vector&lt;/dt&gt;

      
          &lt;dd&gt;&lt;a href=&quot;https://www.first.org/cvss/calculator/3.1#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&quot;&gt;CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N&lt;/a&gt;&lt;/dd&gt;
        

      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        &lt;ul&gt;
          
          &lt;li&gt;&lt;code&gt;&amp;#62;=0.8.0&lt;/code&gt;&lt;/li&gt;
          
        &lt;/ul&gt;
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;Pingora versions prior to 0.8.0 generated cache keys using only the URI path, excluding critical factors such as the host header. This allows an attacker to poison the cache and serve cross-origin responses to users.&lt;/p&gt;
&lt;p&gt;This vulnerability affects users of Pingora&apos;s alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for cross-tenant data leakage in multi-tenant deployments, or serve malicious content to legitimate users by poisoning shared cache entries.&lt;/p&gt;
&lt;p&gt;This flaw was corrected in commit 257b59ada28ed6cac039f67d0b71f414efa0ab6e by removing the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header and origin server HTTP scheme. We strongly recommend that users upgrade to Pingora &amp;gt;= 0.8.0.&lt;/p&gt;
&lt;p&gt;Note: Cloudflare customers and Cloudflare&apos;s CDN infrastructure were not affected by this vulnerability, as Cloudflare&apos;s default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0032: Vulnerability in dnp3times</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0032.html</id><updated>2026-03-05T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0032.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0032: Vulnerability in dnp3times"/><published>2026-03-04T12:00:00+00:00</published><summary xml:lang="en">`dnp3times` was removed from crates.io due to malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/dnp3times/RUSTSEC-2026-0032.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/dnp3times/RUSTSEC-2026-0032.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0032&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0032
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;dnp3times&lt;/code&gt; was removed from crates.io due to malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-04&quot;&gt;
          March  4, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          (last modified: March  5, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/dnp3times.html&quot;&gt;dnp3times&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/dnp3times&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-xhw7-jhmp-j62j&quot;&gt;GHSA-xhw7-jhmp-j62j&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;dnp3times&lt;/code&gt; crate attempted to exfiltrate &lt;code&gt;.env&lt;/code&gt; files to a server
that was in turn impersonating the legitimate &lt;code&gt;timeapi.io&lt;/code&gt; service. It was
loosely trying to typosquat the &lt;code&gt;dnp3time&lt;/code&gt; crate, but otherwise was the same
attack as the &lt;code&gt;time_calibrator&lt;/code&gt; and &lt;code&gt;time_calibrators&lt;/code&gt; malware yesterday.&lt;/p&gt;
&lt;p&gt;The malicious crate had 1 version published on 2026-03-04 approximately 6 hours
before removal and had no evidence of actual downloads. There were no crates
depending on this crate on crates.io.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry><entry><title>RUSTSEC-2026-0031: Vulnerability in time_calibrators</title><id>https://rustsec.org/advisories/RUSTSEC-2026-0031.html</id><updated>2026-03-05T12:00:00+00:00</updated><link href="https://rustsec.org/advisories/RUSTSEC-2026-0031.html" rel="alternate" type="text/html" title="RUSTSEC-2026-0031: Vulnerability in time_calibrators"/><published>2026-03-03T12:00:00+00:00</published><summary xml:lang="en">`time_calibrators` was removed from crates.io due to malicious code</summary><content xml:lang="en" type="html">  &lt;article&gt;
    
        &lt;span class=&quot;floating-menu&quot;&gt;
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/commits/main/crates/time_calibrators/RUSTSEC-2026-0031.md&quot;&gt;History&lt;/a&gt; ⋅
          &lt;a href=&quot;https://github.com/RustSec/advisory-db/edit/main/crates/time_calibrators/RUSTSEC-2026-0031.md&quot;&gt;Edit&lt;/a&gt; ⋅
          &lt;a href=&quot;https://api.osv.dev/v1/vulns/RUSTSEC-2026-0031&quot;&gt;JSON (OSV)&lt;/a&gt;
        &lt;/span&gt;
    

    &lt;header&gt;
      &lt;h1&gt;
        
        RUSTSEC-2026-0031
        
      &lt;/h1&gt;
      &lt;span class=&quot;subtitle&quot;&gt;&lt;p&gt;&lt;code&gt;time_calibrators&lt;/code&gt; was removed from crates.io due to malicious code&lt;/p&gt;
&lt;/span&gt;
    &lt;/header&gt;

    

    &lt;dl&gt;
      &lt;dt id=&quot;reported&quot;&gt;Reported&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-03&quot;&gt;
          March  3, 2026
        &lt;/time&gt;
      &lt;/dd&gt;

      &lt;dt id=&quot;issued&quot;&gt;Issued&lt;/dt&gt;
      &lt;dd&gt;
        &lt;time datetime=&quot;2026-03-03&quot;&gt;
          March  3, 2026
        &lt;/time&gt;
        
        &lt;time datetime=&quot;2026-03-05&quot;&gt;
          (last modified: March  5, 2026)
        &lt;/time&gt;
        
      &lt;/dd&gt;

      &lt;dt id=&quot;package&quot;&gt;Package&lt;/dt&gt;
      &lt;dd&gt;
        
        
        &lt;a href=&quot;/packages/time_calibrators.html&quot;&gt;time_calibrators&lt;/a&gt;
          (&lt;a href=&quot;https://crates.io/crates/time_calibrators&quot;&gt;crates.io&lt;/a&gt;)
        
        
      &lt;/dd&gt;

      &lt;dt id=&quot;type&quot;&gt;Type&lt;/dt&gt;
      &lt;dd&gt;
        
        Vulnerability
        
      &lt;/dd&gt;

      

      

      
      &lt;dt id=&quot;aliases&quot;&gt;Aliases&lt;/dt&gt;
      &lt;dd&gt;
        &lt;ul&gt;
          
          &lt;li&gt;
            
            &lt;a href=&quot;https://github.com/advisories/GHSA-wf45-3gpw-vrqv&quot;&gt;GHSA-wf45-3gpw-vrqv&lt;/a&gt;
            
          &lt;/li&gt;
          
        &lt;/ul&gt;
      &lt;/dd&gt;
      

      

      

      
      

      &lt;dt id=&quot;patched&quot;&gt;Patched&lt;/dt&gt;
      &lt;dd&gt;
        
        no patched versions
        
      &lt;/dd&gt;

      

      
      
    &lt;/dl&gt;

    
    

    &lt;h3 id=&quot;description&quot;&gt;Description&lt;/h3&gt;
    &lt;p&gt;The &lt;code&gt;time_calibrators&lt;/code&gt; crate attempted to exfiltrate &lt;code&gt;.env&lt;/code&gt; files to a server
that was in turn impersonating the legitimate &lt;code&gt;timeapi.io&lt;/code&gt; service.&lt;/p&gt;
&lt;p&gt;The malicious crate had 1 version published on 2026-03-03 approximately 3 hours
before removal and had no evidence of actual downloads. There were no crates
depending on this crate on crates.io.&lt;/p&gt;
&lt;p&gt;Thanks to cybergeek for finding and reporting this to the Rust security
response working group, and thanks to Emily Albini for co-ordinating with the
crates.io team.&lt;/p&gt;


    &lt;p id=&quot;license&quot; class=&quot;license&quot;&gt;Advisory available under &lt;a href=&quot;https://spdx.org/licenses/CC0-1.0.html&quot;&gt;CC0-1.0&lt;/a&gt;
    license.

    
    &lt;/p&gt;
  &lt;/article&gt;</content></entry></feed>